Victor,
Thank you. I've managed to write code that does fingerprint verification
like you suggested, and it seems to work.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Victor Duchovni
Sent: Wednesday, February 13, 2008 8:59 AM
To:
You are right, it is just a signal I should ignore. Now it works
perfectly.
Maybe the fact that the SSL_write might rise a SIGPIPE should be in the
documentation, because it happens only in particular situations (2
writes in a row with connection closed remotely), and it might cause
Hi,
I am making an application that makes SSL connections. The problem is
that my application will run in a chrooted environment, and will not be
able to access /dev/urandom, but I have a function available which can
read random values from a TRNG. I would like to know if my approach to
the
Alessandro Pivi - GLOBALcom engineering wrote:
You are right, it is just a signal I should ignore. Now it works perfectly.
Maybe the fact that the SSL_write might rise a SIGPIPE should be in the
documentation, because it happens only in particular situations (2
writes in a row with connection
Joel Christner wrote:
Hello,
I have a simple client-server program and am using blowfish. I'm using
the EVP_* routines to initialize, encrypt, and decrypt. Variable-length
data is taken in from the client through stdin and sent to the server
socket after encryption. One question I have is
Hi,
I'm writing an application on Solaris10AMD64 using 0.9.7d version of OpenSSL
(comes along with the OS). In my application, AES_set_encrypt_key() is
returning -2 for 256 bit key length. I also found that it works only for 128
bit key length. I came to know that this is a known issue with
Ok, I will change that. Can you provide any guidance on how to empty the
buffer?
Thanks
On Thu, Feb 14, 2008 at 2:50 AM, jimmy bahuleyan [EMAIL PROTECTED]
wrote:
Joel Christner wrote:
Hello,
I have a simple client-server program and am using blowfish. I'm using
the EVP_* routines to
I have noticed this as well. I believe it operates correctly in the
0.9.9 snapshot.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Larry Bugbee
Sent: February 13, 2008 8:41 PM
To: openssl-users@openssl.org
Subject: Re: ECC Self-Signed Certificate
On Wed, Feb 13, 2008 at 05:06:35PM -0500, Cooper, Andy wrote:
Thank you. I've managed to write code that does fingerprint verification
like you suggested, and it seems to work.
Cool. If you are concerned about second pre-image attacks on md5,
use sha1, if you are also concerned about sha1, you
Can anyone please help me out on this...Thanks
--
Shanku
--- Shanku Roy [EMAIL PROTECTED] wrote:
Hi Folks,
Can anyone please point me to the location of function definition of
i2d_ASN1_INTEGER
() in OpenSSL source code. I could trace only till the following in the
header files:
Thanks. As it turns out I had enabled all digest algorithms and used
SHA256 which is probably somewhat of an overkill ...
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Victor Duchovni
Sent: Thursday, February 14, 2008 10:55 AM
To:
On Thu, Feb 14, 2008 at 10:56:53AM -0500, Cooper, Andy wrote:
Thanks. As it turns out I had enabled all digest algorithms and used
SHA256 which is probably somewhat of an overkill ...
Yes, it is somewhat paranoid, but not unreasonably so. Wouldn't have
brought it up it otherwise...
--
[EMAIL PROTECTED] wrote on 02/14/2008 05:45:21 PM:
Can anyone please help me out on this...Thanks
--
Shanku
--- Shanku Roy [EMAIL PROTECTED] wrote:
Hi Folks,
Can anyone please point me to the location of function
definition of i2d_ASN1_INTEGER
() in OpenSSL source code. I
On Tue, Feb 12, 2008, Shanku Roy wrote:
Hi Folks,
Can anyone please point me to the location of function definition of
i2d_ASN1_INTEGER
() in OpenSSL source code. I could trace only till the following in the
header files:
file crypto/asn1/asn1.h:
#define I2D_OF(type) int
From: edam
...
I was wondering - where would you guys suggest I go to read
up on OpenSSL
programming? I've been reading their manpages online at
http://www.openssl.org/docs/
but to be honest, they're fairly complicated when you're new
to OpenSSL!
And there are gaps in the
Hi,
I have a pretty simple question. I need to install mod_tsa on my OS X
machine.
One command to be executed is:
make OPENSSL=openssl_root
I could not find out what is
openssl_root
On my Mac.
Ted Zeng
__
OpenSSL Project
Radhika Hebbar wrote:
Hi,
I’m writing an application on Solaris10AMD64 using 0.9.7d version of
OpenSSL (comes along with the OS). In my application,
AES_set_encrypt_key() is returning -2 for 256 bit key length. I also
found that it works only for 128 bit key length. I came to know that
U from a command window try:
find / -name ssl
?
Sent from my Verizon Wireless BlackBerry
-Original Message-
From: Ted Zeng [EMAIL PROTECTED]
Date: Thu, 14 Feb 2008 16:08:36
To:openssl-users@openssl.org
Subject: Where is openssl_root on OS X?
Hi,
I have a pretty simple
Hi Group,
I am trying to create a SSL server with the following code.
I am using the function ERR_print_errors_fp to get the last error in case
of any failure. I want to divert the output to standard output stdout.
For e.g.
if(!SSL_CTX_use_PrivateKey_file(ctx, privatee.key, SSL_FILETYPE_PEM))
Anyone have any ideas?
Thanks
On Wed, Feb 13, 2008 at 6:44 PM, Joel Christner [EMAIL PROTECTED]
wrote:
Hello,
I have a simple client-server program and am using blowfish. I'm using
the EVP_* routines to initialize, encrypt, and decrypt. Variable-length
data is taken in from the client
20 matches
Mail list logo