Hi All,
Ours is a client server application, with Server: Apache/2.2.3, Interface:
mod_ssl/2.2.3, Library: OpenSSL/0.9.8. The Server has been modified to suit our
needs using C++. Its entry point is Init_Instance(). Apache has its own entry
point main(). The client is a MFC application.
Now I
> From: owner-openssl-us...@openssl.org On Behalf Of Young, Alistair
> Sent: Wednesday, 04 February, 2009 09:52
> I seem to have some success if I place quotes around the [Linux] command
line:
> $ cat message.bin | openssl dgst -sha256 -hmac "`cat key.bin`" -binary >
mac.bin
(Don't need cat here,
(Oops, I just found this un-sent, sorry)
> From: owner-openssl-us...@openssl.org On Behalf Of Carol Walter
> Sent: Thursday, 29 January, 2009 11:28
> ... I'm trying to use openssl to connect to postgres. The
> process is not working. When I try to connect using s_client without
> any of the
http://www.rsa.com/rsalabs/node.asp?id=2124 has links to the PKCS
formats (Public-Key Cryptography Standards).
http://www.rfc-editor.org/rfc/rfc4648.txt has the documentation on the
base64 encoding that the PEM_ functions work with.
(This is in addition to the links that Dr. Henson has provided.)
On Thu, Feb 05, 2009, Tomasz Ka??mierczak wrote:
> Hello,
>
> In the OpenSSL API there are functions called PEM_write_RSAPrivateKey(),
> PEM_write_RSAPublicKey() and corresponding read functions:
> PEM_read_RSAPrivateKey(), PEM_read_RSAPublicKey(). What I need is to
> read/write RSA keys to/fro
Hello,
In the OpenSSL API there are functions called PEM_write_RSAPrivateKey(),
PEM_write_RSAPublicKey() and corresponding read functions:
PEM_read_RSAPrivateKey(), PEM_read_RSAPublicKey(). What I need is to
read/write RSA keys to/from a file in exactly the same format as these
functions do,
Hi Users,
I use Apache Webserver and mod_ssl as the server application. I want to upgrade
this server to use FIPS validated module, hence I am using Openssl-fips-1.2 in
conjunction with Openssl-0.9.8j.
I would like to know, where we have to make this fips_mode_set() API call.
Should the fips-mo
dratone writes:
> I've read the documentation (3 times over), but can't fully make sense
> of it. Could someone show me an example of how to create a listening ssl
> socket, and a connecting ssl socket?
I would consider boost::asio:
http://www.boost.org/doc/libs/1_37_0/doc/html/boost_asio.h
Hi,
I've read the documentation (3 times over), but can't fully make sense
of it. Could someone show me an example of how to create a listening ssl
socket, and a connecting ssl socket?
Kind regards,
JJ Laurens,
A.k.a. Dratone
_
"Pickford, Steve" writes:
> I wonder if you can help me, I can connect to our Active Directory server with
> ldapsearch compiled and running with TLS under linux.
>
> If I do this with my mingw version I get :-
>
> TLS trace: SSL3 alert write:fatal:unknown CA
You need to tell it where your l
Hello,
i explored this article:
http://support.microsoft.com/kb/315588
My questions are about using openssl to generate client-side certificate
for using in SSL tunnel
1. can it be self-signed root certificate?
2. what options of openssl must i use so that Internet Explorer could
import it?
-Original Message-
From: owner-openssl-us...@openssl.org
[mailto:owner-openssl-us...@openssl.org] On Behalf Of Dr. Stephen Henson
Sent: 05 February 2009 12:29
To: openssl-users@openssl.org
Subject: Re: OpenSSL command line HMAC
> On Thu, Feb 05, 2009, Young, Alistair wrote:
>
> > Thanks S
On Thu, Feb 05, 2009, Young, Alistair wrote:
>
> Thanks Steve. Unfortunately we need to something with FIPS validation
> behind it, so the standard Java crypto libraries (or something like
> BouncyCastle) are out. It also means that we can't modify the OpenSSL
> source so would have to add wrap
-Original Message-
From: owner-openssl-us...@openssl.org
[mailto:owner-openssl-us...@openssl.org] On Behalf Of Dr. Stephen Henson
Sent: 04 February 2009 15:20
To: openssl-users@openssl.org
Subject: Re: OpenSSL command line HMAC
> On Wed, Feb 04, 2009, Young, Alistair wrote:
>
> > Well, ha
I wonder if you can help me, I can connect to our Active Directory
server with ldapsearch compiled and running with TLS under linux.
If I do this with my mingw version I get :-
TLS trace: SSL3 alert write:fatal:unknown CA
I am not aware of doing anything different under linux, it just worked
15 matches
Mail list logo