- Original Message -
From: Dattesh Lotlikar [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Wednesday, September 24, 2003 6:23 AM
Subject: Re: Cisco VPN Client
Did u try openssl req -text -inform DER -in myReq.cer ??
regards,
dattesh
Yes, result:
unable to load X509 request
Hi,
i am trying to intall openssl for th
windows CE platform. I am following the relative readme file which is included
in openssl 0.9.7b.
Everything is okuntil the
ms\do_ms.
However when i execute nmake -f
ms\cedll.mak after several succesfull lines i get the following:
nul.\ssl\tls1.h
Hi,
I am trying to install openssl0.9.7b
for windows ce platform.
I have an ipaq 3970 which has an xscale
processor.Is it correct to execute the WCEARM.BAT to setup the eMbedded
C++ env before installation ??
Thanks in
advance
Frank wrote:
Steve, thanks. My understanding is that DSA signatures should be 40bytes
not 48 (i.e. 2* the length of q (160 bits) accoridng to the standard).
Can you or someone else explain the difference ?
The DSA signature is the DER encoding of (the ASN.1 object):
SEQUENCE {
r
Hello,
Do you have generated wcecompat.lib and wcecompattex.lib??.
To generate these two files you need to through D:\...\Microsoft eMbedded
Tools\EVC\WCE300\BINwcearm.bat. By default wcearm.bat is generate for
Pocket Pc 2000, for Pocket Pc 2002 you need to change if %PLATFORM%
==
Hi,
for a multiplatform project, I'm trying to find a method to create and verify
RSA signatures between the following 'worlds' of cryptography:
- MS CryptoAPI (unluckily brought in a certain crypto smart card)
- OpenSSL
- Java Cryptography (currently using the bouncy castle provider)
Whereas
On Wed, Sep 24, 2003, Andreas Feldner wrote:
Hi,
for a multiplatform project, I'm trying to find a method to create and verify
RSA signatures between the following 'worlds' of cryptography:
- MS CryptoAPI (unluckily brought in a certain crypto smart card)
- OpenSSL
- Java Cryptography
Title: Message
Yes,
the XScale is an ARM v5.
Regards,
Steven
-Original Message-From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Kambourakis GeorgiosSent: Wednesday, 24 September
2003 6:15 PMTo: [EMAIL PROTECTED]Subject: ARM
and Xscale processor
Hi,
Andreas,
Regarding Java S/MIME, check out http://www.bouncycastle.org/, which claims,
Generators for S/MIME and CMS (PKCS7).
I have used Bouncy Castle's crypto APIs, but not their S/MIME APIs, so I am not sure
about the details of their S/MIME APIs and whether they will satisfy your needs.
Title: Password-based encryption with md5 cbc, how
Hi, I am new to the OpenSSL. I have a java program that uses the jce sample of Password-based encryption with md5 and cbc. It uses a fixed salt and count. And the algorithm is the password-based encryption algorithm as defined in RSA
Hi everybody Can anybody tell me how to find out the depth of the correct certificate in the verify_callback function. I have used SSL_CTX_set_verify(ctx,SSL_VERIFY_PEER,verify_callback). In case of an error i can use X509_STORE_CTX_get_error(). But i want to find out the depth in the case when
Rich Salz wrote:
reversible compression hash alogorithms out there?
I'm not a mathematical cryptographer, but that phrase sounds like an
implausability to me.
It is, of course, trivial to prove that anything with arbitrary length
input and fixed length output is not reversible. I missed the
On Wed, Sep 24, 2003, Lule Chen wrote:
Hi, I am new to the OpenSSL. I have a java program that uses the jce sample
of Password-based encryption with md5 and cbc. It uses a fixed salt and
count. And the algorithm is the password-based encryption algorithm as
defined in RSA Laboratories, PKCS
Title: RE: Password-based encryption with md5 cbc, how
Thanks, Dr. Stephen:
I have to confess that I have never used OpenSSL library. Could you please provide some sample code (or outline the steps and the related OpenSSL functions)?
Thanks a lot for your help!
Louis
-Original
On Wed, Sep 24, 2003, Lule Chen wrote:
Thanks, Dr. Stephen:
I have to confess that I have never used OpenSSL library. Could you please
provide some sample code (or outline the steps and the related OpenSSL
functions)?
I suggest you read the manual pages and examples for EVP_CipherInit()
Title: RE: Password-based encryption with md5 cbc, how
Thanks, Dr. Stephen:
Another question: what is the key length, 64 bits or 128 bits?
Louis
-Original Message-
From: Dr. Stephen Henson [mailto:[EMAIL PROTECTED]]
Sent: September 24, 2003 11:48 AM
To: [EMAIL PROTECTED]
On Wed, Sep 24, 2003, Lule Chen wrote:
Thanks, Dr. Stephen:
Another question: what is the key length, 64 bits or 128 bits?
Well you originally said PKCS#5 v1.5 and the only algorithm defined in there
is DES-CBC which is 56 bits.
Steve.
--
Dr Stephen N. Henson.
Core developer of the
Hi Folks,
I'm using the Net::SSLeay front-end to OpenSSL. Does
anyone have a Perl script that can parse an X.509
certificate?
Thanks,
Oily
__
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com
It is, of course, trivial to prove that anything with arbitrary length
input and fixed length output is not reversible. I missed the rest of
this discussion though :-)
Cheers,
Ben.
Nonsense. See US patent 5,533,051 (Compression of Random Data) and
5,488,364 (Recursive Data
Hi,
I have a server program using OpenSSL. It works well
most of the time. However, when multiple clients
connect to the server simultaneously, the server
sometimes crashes with an access violation in the
following code:
/* locked by SSL_CTX in the calling function */
static void
David Schwartz wrote:
Nonsense. See US patent 5,533,051 (Compression of Random Data) and
5,488,364 (Recursive Data Compression). Basically, you separate the ones
from the zeroes and compress them independently.
Does it compress to one bit, or two?
Have you used the following functions to register OpenSSL thread-safety
callbacks:
CRYPTO_set_locking_callback(locking_function);
CRYPTO_set_id_callback(id_function);
You need to supply your own locking_function() and id_function(), samples of
which can be found in OpenSSL's
On September 24, 2003 07:53 pm, Michael Sierchio wrote:
David Schwartz wrote:
Nonsense. See US patent 5,533,051 (Compression of Random Data) and
5,488,364 (Recursive Data Compression). Basically, you separate the
ones from the zeroes and compress them independently.
Does it compress
23 matches
Mail list logo