> On Tue, 30 Oct 2007, [EMAIL PROTECTED] wrote:
>
>> Hi
>>
>> I have one worrying question... I have generated my keys and ca and all
>> with easy-rsa package and he has generated 1024 bit rsa keys... but as
>> far
>> as I have seen openvpn is using blowfish... blowfish in a symetric
>> encription
Hello,
Please pardon the newbie question. I was curious if anyone had any links or
references that they could point me to for more details on how to use
blowfish.h with C? I've gone through the man pages but was hoping for
something more intuitive, step-by-step, or outlining when to use specific
[...]
On 10/30/07, Scott Gifford <[EMAIL PROTECTED]> wrote:
> If this presents a real problem, the general solution is to use a
> specialized malloc, which uses a memory allocation method that allows
> returning memory to the OS, such as mmap. I'm not sure how to use a
> custom malloc with OpenSSL
Lutz Jaenicke <[EMAIL PROTECTED]> writes:
[...]
> Yes, only 100MB might be actually used but the 2GB would still be
> reserved in memory.
> To get an idea about this behavior you can write a simple program like
And just to elaborate a little, if other processes need this memory,
the OS will swap
On Tue, 30 Oct 2007, [EMAIL PROTECTED] wrote:
Hi
I have one worrying question... I have generated my keys and ca and all
with easy-rsa package and he has generated 1024 bit rsa keys... but as far
as I have seen openvpn is using blowfish... blowfish in a symetric
encription cypher and rsa is an
Hey all,
I'm very new to security and generating key files. I'm following the
instructions I've found here: http://www.securityfocus.com/infocus/1677 and I'm
having trouble generating the private / public key pair and certificate.
In step 2 it asks: "Enter pass phrase for C:\CA\private\CAkey.pe
On 10/30/07, Dave Bound wrote:
> >> Not everyone can use the default build of OpenSSL.
> Can you point me at some docs which will allow me to ascertain whether I
> fall into the 'not everyone' category?
One thing to consider is if you want to include the patented ciphers
in your build, such as RC
Hallo,
I am using the symmetric cypher functions to encrypt and then
decrypt a string. The cipher is "aes-256-cbc". When I try to decrypt
the string, I get this error:
error 06065064: digital envelope routines: EVP_DecryptFinal_ex: bad decrypt
I am using the same key and same iv. The s
Dave Bound wrote:
Not everyone can use the default build of OpenSSL.
Can you point me at some docs which will allow me to ascertain whether I
fall into the 'not everyone' category?
-Original Message-
From: Thomas J. Hruska [mailto:[EMAIL PROTECTED]
Sent: Tuesday 30 October 2007 10:56
>> Not everyone can use the default build of OpenSSL.
Can you point me at some docs which will allow me to ascertain whether I
fall into the 'not everyone' category?
-Original Message-
From: Thomas J. Hruska [mailto:[EMAIL PROTECTED]
Sent: Tuesday 30 October 2007 10:56
To: openssl-users@
> > Asymmetric ciphers like RSA are used on very small pieces of
> > information,
> > not on bulk data. In the case of encryption, the asymmetric algorithm is
> > used to securely exchange a random small number that is then
> > used as the key
> > in a symmetric algorithm like blowfish or AES.
>
On Tue, 2007-10-30 at 02:59 -0700, David Schwartz wrote:
> > I have one worrying question... I have generated my keys and ca and all
> > with easy-rsa package and he has generated 1024 bit rsa keys... but as far
> > as I have seen openvpn is using blowfish... blowfish in a symetric
> > encription c
Dave Bound wrote:
Is there a way to use Win32 OpenSSL in silent mode?
The installer is Innosetup-based. Read the docs for Innosetup on
several command-line switches that Innosetup has for silent installs.
You should make sure you display a compatible license agreement to your
users when you
Steffen DETTMER wrote:
> * Ramashish Baranwal wrote on Tue, Oct 30, 2007 at 15:06 +0530:
>
>>> The heap size will never be reduced again regardless of the
>>> amount of "free()" calls, the memory can however be reused.
>>> Therefore, if your application at one point in time needs a
>>> lot of he
> Is openssl using some kind of memory
> caching for its ssl handshake which is not getting released when the
> handshake is over?
Each established SSL/TLS connection allocates at least 58983 bytes.
All those 3 buffers (18437 B, 18698 B, 21848 B) are allocated when the
new connection is accepted w
> I have one worrying question... I have generated my keys and ca and all
> with easy-rsa package and he has generated 1024 bit rsa keys... but as far
> as I have seen openvpn is using blowfish... blowfish in a symetric
> encription cypher and rsa is an asymetrical one... shouldn't match keys
> an
* Ramashish Baranwal wrote on Tue, Oct 30, 2007 at 15:06 +0530:
> > The heap size will never be reduced again regardless of the
> > amount of "free()" calls, the memory can however be reused.
> > Therefore, if your application at one point in time needs a
> > lot of heap space the memory consumptio
On 10/30/07, Lutz Jaenicke <[EMAIL PROTECTED]> wrote:
> Ramashish Baranwal wrote:
> > Hi,
> >
> > I have a server which accepts ssl connections. I have a client which
> > does parallel ssl
> > connections to this. After closing all connections the server has
> > unfreed memory. This gets reused for
Is there a way to use Win32 OpenSSL in silent mode?
-Original Message-
From: Thomas J. Hruska [mailto:[EMAIL PROTECTED]
Sent: Monday 29 October 2007 14:22
To: openssl-users@openssl.org
Subject: Re: OpenSSL How to redistribute as part of our application
Bernhard Froehlich wrote:
> Dave Bo
Ramashish Baranwal wrote:
> Hi,
>
> I have a server which accepts ssl connections. I have a client which
> does parallel ssl
> connections to this. After closing all connections the server has
> unfreed memory. This gets reused for subsequent ssl connections, so no
> issue there.
>
> My problem is
Hi
I have one worrying question... I have generated my keys and ca and all
with easy-rsa package and he has generated 1024 bit rsa keys... but as far
as I have seen openvpn is using blowfish... blowfish in a symetric
encription cypher and rsa is an asymetrical one... shouldn't match keys
and cyphe
21 matches
Mail list logo