I'm trying to build OpenSSL 1.1.0 pre 3 release in debug mode. According to the
INSTALL.WIN file:
"If you add --debug to the Configure lines above then debugging symbols will be
compiled in."
perl Configure VC-WIN64A --debug no-rc4 no-idea
results in:
Configured for VC-WIN64A.
Using the
On Thu, Feb 18, 2016, c.hol...@ades.at wrote:
> I'd like to add the following to my thread.
>
> - If I use option -nosigs then it is working.
> But sure its not verifying. If I change the content it is still ok
> with this option in place.
>
> - I tried also the current 1.0.1r and get the same
I'd like to add the following to my thread.
- If I use option -nosigs then it is working.
But sure its not verifying. If I change the content it is still ok with
this option in place.
- I tried also the current 1.0.1r and get the same behaviour with 1.0.1e.
- Option -binary does not help.
Hi,
I am trying to compile openssl 1.0.1r for android and statically link to
my application.
I am getting a compile error in the file
https://github.com/openssl/openssl/blob/OpenSSL_1_0_1-stable/crypto/evp/e_aes.c
at line 61 # include "modes_lcl.h"
This modes_lcl.h is present at
[Top-posting because Outlook can't handle HTML email properly.]
Always state what version of OpenSSL you're using.
"sha256" is correct, if that algorithm has been added. Have you called
OpenSSL_add_all_algorithms()?
There is no universal "list of valid strings", because OpenSSL can be built
Hello!
I have a little problem with an update from an old 1.0.0e (vanilla
compiled) vs.
debians (7.9, stable) 1.0.1e.
I try to verify an smime-signature
Tried with the same smime-file and with the same certificates on the
same machine.
The certificates are fine and are ok if I verify them.
Hi,
I am trying to use EVP APIs for generating sha256 hashes.
I think of the step is to pass the digest name to EVP_get_digestbyname()
and get the EVP_MD* structure
However, I am not able to find the valid string to be passed for SHA256
hash algorithm.. I tried passing "sha256", "SHA256", it
Hi,
I'm looking for a DTLS solution that supports a specific set of cipher
suites. There is a listing (link below, not sure for which openssl
version?) where I found some of them, but still I did not find the
following ones:
TLS_ECDH_ANON_WITH_AES_128_CBC_SHA256