RE: PEM_read_RSAPrivateKey() does not call callback function

2008-03-26 Thread learning openssl
Hello Steve, Thanks! It works. Date: Tue, 25 Mar 2008 18:00:58 +0100 From: [EMAIL PROTECTED] To: openssl-users@openssl.org Subject: Re: PEM_read_RSAPrivateKey() does not call callback function On Tue, Mar 25, 2008, learning openssl wrote: Hello, I created a private key with

How many letters can we enter for the PEM pass phrase?

2008-03-26 Thread learning openssl
Hello, I am wondering how many letters we can enter for the PEM pass phrase? It seems that the maxium length is 1024. Can we change the pass phrase later? if so, which functions can we use? Thanks in advance! _ Discover the new

0.9.8 fips compatible option ?

2008-03-26 Thread Gerald Paprocki
All, I understand that there is not currenlty a FIPS compatible option available for openSSL version 0.9.8x. We are hesitant to downgrade our current version to 0.9.7 due to outstanding security fixes that only exist in 0.9.8. I do however understand that there are plans to enable the 0.9.8

something about the PEM pass phrase

2008-03-26 Thread learning openssl
Hello, I use the function PEM_write_RSAPrivateKey(privateKeyFilePW, r,EVP_des_ede3_cbc(),NULL, 0, NULL, NULL) to write the RSA private key with a pass phrase. But I am wondering where the pass phrase is stored? later I use the function PEM_read_RSAPrivateKey(privateKeyFilePW, keyReading,

Generation of DES key

2008-03-26 Thread EL HACHIMI Driss
Hello, I need to encrypt a password with a DES key, I'm trying the following code: char * buff[20]; int theDESCheckResult; DES_cblock * theDESKey1; DES_key_schedule *theSchedule; DES_cblock * theOutput; ALMLog (@Enter your DBPassword); fgets((char *)buff, 10,

Generating Keys in Triple-DES encryption

2008-03-26 Thread Ambarish Mitra
Hi all, Background: My application reads an encrpyted-base64 password from a config file and decrypts the same inside the application. The password is encryped using Triple-DES algorithm. To encrypt and base64 the actual password, a stand-alone utility is provided. We run this utility, and then

SSL performance hit + buffer sizes

2008-03-26 Thread Urjit Gokhale
Hello everyone, I would like to know your view on Would the performance impact for transmitting 'X' bytes of unencrypted data over SSLized channel be almost same irrespective of the number of SSL_* calls ? Consider I am using a buffer of size 'buf_size' for SSL_read/write

RE : Generation of DES key

2008-03-26 Thread El hallabi-Kettani Abderrahmane
Hello Driss, I think, it will be theDESCheckResult = DES_set_key_checked(theDESKey1, theSchedule); DES_ecb_encrypt((DES_cblock *) buff, (DES_cblock *) theOutput, theSchedule, DES_ENCRYPT); Namely that DES_ecb_encrypt is described like that : void

Re: Generating Keys in Triple-DES encryption

2008-03-26 Thread jimmy bahuleyan
Ambarish Mitra wrote: Hi all, Background: My application reads an encrpyted-base64 password from a config file and decrypts the same inside the application. The password is encryped using Triple-DES algorithm. To encrypt and base64 the actual password, a stand-alone utility is provided. We run

Re: SSL performance hit + buffer sizes

2008-03-26 Thread jimmy bahuleyan
Urjit Gokhale wrote: Hello everyone, I would like to know your view on Would the performance impact for transmitting 'X' bytes of unencrypted data over SSLized channel be almost same irrespective of the number of SSL_* calls ? Consider I am using a buffer of size 'buf_size' for

[SOLVED] Re: Strange OpenSSL error when trying to use OpenVPN

2008-03-26 Thread Richard Hartmann
My certificate uses a SHA256 hash and the client has OpenSSL 0.9.7. 0.9.8 is needed to support SHA256 hashes. __ OpenSSL Project http://www.openssl.org User Support Mailing List

Queries on Cert Store and load verify locations

2008-03-26 Thread PS
Hi, I had a set of related questions regarding the trusted CA store and certificate chaining: 1. Lets say we have a chain of the form RootCA - SubCA - Server-certificate. Now, Will the openssl verify function be able to verify if I give only the SubCA as the trusted CA Cert and the above

Re: 0.9.8 fips compatible option ?

2008-03-26 Thread Steve Marquess
Gerald Paprocki wrote: ... I do however understand that there are plans to enable the 0.9.8 version to operate in FIPS mode. Is anyone aware of a forecast date as to when a certified solution would be available ? I had seen estimates ranging from February of this year to the later part of

RE : Generation of DES key

2008-03-26 Thread EL HACHIMI Driss
Hello Abderrahmane, Thank you for your answer. Best Regards El hallabi-Kettani Abderrahmane [EMAIL PROTECTED] a écrit : Hello Driss, I think, it will be theDESCheckResult = DES_set_key_checked(theDESKey1, theSchedule); DES_ecb_encrypt((DES_cblock *) buff, (DES_cblock *)

Certificate Chain and Trusted Directory

2008-03-26 Thread PS
Hi, I had a set of related questions regarding the trusted CA store and certificate chaining: 1. Lets say we have a chain of the form RootCA - SubCA - Server-certificate. Now, Will the openssl verify function be able to verify if I give only the SubCA as the trusted CA Cert and the above

RE: Generating Keys in Triple-DES encryption

2008-03-26 Thread Ambarish Mitra
Hi Jimmy, Thanks for your response. Kindly find my thoughts inlined.. Question: So, the question is: How can we generate a key for Triple DES encryption and write out the same in a file? Simple answer for 'how to generate a key for a symmetric cipher' is 'use a pseudo-random generator' to