Re: testing null encryption

2011-07-28 Thread yyy
I also tried the same, and although wireshark labeled these data as "encrypted application data", the text next to hex data in bottom window contained unencrypted data. There were something added in the end, though. (negotiated ciphersuite were NULL-SHA). > 2) Getting back to the client & ser

Re: testing null encryption

2011-07-28 Thread Victor Duchovni
On Thu, Jul 28, 2011 at 09:14:34AM -0700, navin gopalakrishnan wrote: > 1) When i use my own applications (client & server) which uses > the openssl library a separate client program and a separate server > program, both configured to use only eNULL as above. (i.e. with only > NULL_SHA & NULL_MD5)

Re: testing null encryption

2011-07-28 Thread navin gopalakrishnan
hi,   thanks for the info victor. played with the openssl command line utility using the s_client & s_server being configured to use eNULL with only NULL_SHA , NULL_MD5. The other ciphers of eNULL are disabled. I could see the client sending the above ciphers and the server selecting NULL_SH

Re: Re: Re: Handshake question

2011-07-28 Thread castrembi
That didn't work. I immediately got an error from the server : SSL3_GET_CLIENT_HELLO: no shared cipher. Do you know what my original error meant: SSL_BYTES_TO_CIPHER_LIST:scsv received when renegotiating Maybe if I know what it is referring to I can track down the issue. There isn't much po

Re: support for 2048-bit keys

2011-07-28 Thread drichards
It is for RSA keys. Thanks, Dirce > Somewhere I have read that RSA key size limit is 32k or so. Largest key > I have attempted to generate was 24k, largest key successfully > generated and used was 16k. Are the these RSA keys or DH parameters? > In any case 2048bit (2k) sized keys are supported

Re: Simple question: Maximum length of PEM file?

2011-07-28 Thread Katif
Thanks Wim, for your kind & informative answer. Wim Lewis-3 wrote: > > > On 26 Jul 2011, at 10:16 PM, Katif wrote: >> Can you tell me what are the application dependency factor here so we'll >> be >> able to chase a limit? >> >> It is used as an RSA key exchange certification/private key p

Re: support for 2048-bit keys

2011-07-28 Thread yyy
Somewhere I have read that RSA key size limit is 32k or so. Largest key I have attempted to generate was 24k, largest key successfully generated and used was 16k. Are the these RSA keys or DH parameters? In any case 2048bit (2k) sized keys are supported almost by anything. > Hello, > I am working

Re: X509 verify

2011-07-28 Thread Andrea Saracino
I'm using the PEM_write_X509(), avoiding the BIO, is there any difference? Anyway, this function does not give errors. Calling the ERR_error_string() on the failed verify, the error returned is: error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib Searching on Google for this error it is