Using filter BIO's and MD5
Hello, I'm trying generate a base64 encoding of an MD5 hash of a string using a chain of filter BIO's attached to a memory BIO sink. When I extract the data from the memory BIO (after performing a BIO_write followed by a BIO_flush), it appears that only the base64 encoding is performed. When I remove the base64 filter BIO from the chain, the data extracted from the memory BIO is unaltered. I have no problems performing an MD5 hash using the underlying EVP_ functions directly, but I was hoping to be able to use a chain of BIO filters instead. Does anyone have suggestions on this matter? Thanks in advance, Jerry Napoli [EMAIL PROTECTED] __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
RE: I need basic assistance!
Unzip the package, then follow the instructions in the INSTALL.W32 file (I assume you're on win-32 platform). Once you've build everything, it should then be a matter of using the openssl.exe commandline utility: openssl pkcs12 -in input-file -inform DER -out output-file -outform PEM Hope this helps. Jerry [EMAIL PROTECTED] -Original Message- From: Ann Eklund [mailto:[EMAIL PROTECTED]] Sent: Tuesday, January 29, 2002 5:08 PM To: [EMAIL PROTECTED] Subject: I need basic assistance! I've never used OpenSSL before--all I want to do is convert a PKCS#12 certificate to a PEM or CRT certificate. I downloaded openssl-engine-0.9.6c.tar.gz and tried to extract it, but WinZip doesn't do it--it wants to use WinZipClassic, which I must be doing something wrong--I'm not able to get anywhere that looks like an executable program. Can someone walk me through this? Please/thanks. Ann __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED] __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
RE: Question on SSL_dup...
Out of curiosity, doesn't one also have to lock the SSL* itself against concurrent access during read/write operations, or does OpenSSL guard it for the programmer? thanks, jerry -Original Message- From: Sankaran Narayanan [mailto:[EMAIL PROTECTED]] Sent: Thursday, December 27, 2001 10:44 AM To: [EMAIL PROTECTED] Subject: RE: Question on SSL_dup... I am afraid that SSL_dup() does not fulfill your requirements. You can only have one datastream through one SSL object at a time, so that you cannot have two threads concurrently accessing one SSL object. Thanks. It was fairly trivial to write a reference counted wrapper object for SSL*, so that i could avoid using SSL_dup and still allow multiple threads to do free. thanks anyway. __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED] __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]