I've now extended blowfish.pod to be a little bit more informative on
the quirks of BF_encrypt() and BF_decrypt().
thanks, that helps.
itojun
__
OpenSSL Project http://www.openssl.org
what will code look like after the ASN1 redesigning?
I am planing to implement the ASN1 code for PKIX, the first
step should be OCSP.If anyone are planing to rewrite the ASN1
code, tell me the details.
IN PROGRESS
o Steve is currently working on (in no particular order):
I am a freshman in SSL , I want to create certifications under Windows .
Is there anybody can teach me How can I do this ?
Thank you!
---
163µç×ÓÓʾ֣¬¸øÄú¸üÍêÃÀEmail·þÎñ£¡
http://www.163.net
don't know what the difference between yesterday and today is... it
failed yesterday - same machine... today, i removed the beta2 directory
and re-un-tarred it... config, make, make test and it worked... wierd
anyway redhat linux 5.2 on a 486 - (took all morning ;-)
OpenSSL 0.9.6-beta2 17 Sep
I am trying to create a message digest of a file and have created a small
program to spawn the openssl.exe and create a digest, and then use the
libraries to do it on the same file, the problem is i am getting differing
digest values back. Somethings wrong but i cant see what.
plz help
Lee
From: Francesco Gennai [EMAIL PROTECTED]
Francesco.Gennai My first problem is the change in the output of X509 command.
Francesco.Gennai
Francesco.Gennai I had the following call to the x509 command that worked fine
Francesco.Gennai with openssl-0.9.5a
Francesco.Gennai
Francesco.Gennai $
Your code is buggy -- where is CFile::Read supposed to put the data? See
http://msdn.microsoft.com/library/devprods/vs6/visualc/vcmfc/_mfc_cfile.3a3a.read.htm
Or rewrite your code like this:
char buff[1024];
int i;
while ((i = file.Read(buff, sizeof buff)) 0)
On Tue, Sep 19, 2000 at 12:13:54AM -0400, Bodo Moeller wrote:
[...]
Seems that those 0xFFs triggered another BN library bug,
the BN_mod_exp_mont_word function itself should not be sensitive
to what the modulus looks like.
The real bugfix is to change '#if 0' into '#if 1' in
wow it works - thanks, much appreciated
lee
- Original Message -
From: "Rich Salz" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, September 19, 2000 3:48 PM
Subject: Re: digest probs
Your code is buggy -- where is CFile::Read supposed to put the data? See
E/personen/jaenicke/
Lehrstuhl Allgemeine Elektrotechnik Tel. +49 355 69-4129
Universitaetsplatz 3-4, D-03044 Cottbus Fax. +49 355 69-4153
diff -r -u --new-file openssl-SNAP-2919-vanilla/Configure
openssl-SNAP-2919/Configure
--- openssl-SNAP-2919-vanilla
Universitaetsplatz 3-4, D-03044 Cottbus Fax. +49 355 69-4153
diff -r -u --new-file
openssl-SNAP-2919-vanilla/doc/ssl/SSL_CTX_set_cipher_list.pod
openssl-SNAP-2919/doc/ssl/SSL_CTX_set_cipher_list.pod
--- openssl-SNAP-2919-vanilla/doc/ssl/SSL_CTX_set_cipher_list.pod Tue Sep 19
01
Peter Sylvester wrote:
It seems to me that
SMIMEEncryptionKeyPreference ::= CHOICE {
issuerAndSerialNumber [0] IssuerAndSerialNumber,
receipentKeyId [1] RecipientKeyIdentifier,
subjectAltKeyIdentifier [2] SubjectKeyIdentifier
}
is not supported since d2i_ASN1_TYPE
What is the goal of rewriting the ASN1 code?
Will Steve try some ASN1 compiler?
As to my vision, The c code generated by
ASN1 compiler is dirty. Maybe we can write
the ASN1 code in openssl with C++.
I am to build some PKIX stuff with the current ASN1 routines
in Openssl.So If the ASN1 routine
Hi Andreas,
The thing is that this is done, the iSaSiLk server just sends the DSA CA certificates
in the certificates message, no RSA CA certificates.
-Original Message-
From: Andreas Sterbenz [mailto:[EMAIL PROTECTED]]
Sent: den 19 september 2000 09:44
To: Fredrik Lindell (QTX);
Hi,
I'm using OpenSSL 0.9.4 when implementing a SSL client supporting both DSA and RSA
cipher suites. The private keys and certificates are set into the SSL clieent context
using the following (C++) code (the OpenSSL client can also act as an SSL server):
...
if(
It is perfectly legal to use RSA client authentication even if a DSA
ciphersuite is used. The server specifies in its certificate request
message which types of certificates it allows, if you want to restrict
that you can use
context.setAllowedCertificateTypes(SSLContext.CERTTYPE_DSS_SIGN) with
16 matches
Mail list logo