RSA_generate_key: n/e/d and strange keysizes

2004-05-11 Thread Heusden van, FJJ (Folkert)
Hi, I'm trying to create an RSA keypair with the RSA_generate_key function. After seeding the PRNG with some random values, I call RSA_generate_key this way: RSA *pRsa = RSA_generate_key( 1024, // key length 257, // exponent progress, // shows progress NULL //

RE: RSA_generate_key: n/e/d and strange keysizes = PLEASE IGNORE THAT MESSAGE

2004-05-11 Thread Heusden van, FJJ (Folkert)
Please ignore that message: I accidently linked against the OpenSSL library while using libeay32.dll from the MKS toolkit :-/ -Oorspronkelijk bericht- Van: Heusden van, FJJ (Folkert) Verzonden: dinsdag 11 mei 2004 10:49 Aan: '[EMAIL PROTECTED]' Onderwerp: RSA_generate_key: n/e/d and

Unknown Digest Type

2004-05-11 Thread Antonio Andrés Espallardo
Hi. Could anyone help me? I'm obtaining an error when I try to sign an ASN1message with PKCS7_sign: /***//*This is the ASN1 message I need to sign*/ASN1NegotiationRequest *prueba=nr-toASN1Object(); Util *util =

R: Problems whith smime -verify

2004-05-11 Thread Fanton Flavio
the problem disappear with 0.9.7d -Messaggio originale- Da: Fanton Flavio Inviato: venerdì 7 maggio 2004 19.41 A: [EMAIL PROTECTED] Oggetto: Problems whith smime -verify Hi all, We're using openssl 0.9.7a whith my Perl application to verify smime message. My application calls openssl

OpenSSL with MS Proxy Server Issue

2004-05-11 Thread Richard Holliday
Hi, I've successfully linked with the OpenSSL libraries (+ DAVLib) on the Macintosh to produce an app which calls web services on an SSL enabled server. I am running into problems when hitting the secure server via MS Proxy. I use the CONNECT xxx.xxx.xxx:443 syntax to establish an SSL tunnel and

Trouble extracting DNS field from certificate

2004-05-11 Thread Byrial Jensen
Hi, I have some code to extract a DNS field from subjectAltName extensions in X509v3 certificates in the function below. It is based on example 5-8 in the book Network Security with OpenSSL by Viega, Messier and Chandra. It seems to work fine when I use OpenSSL 0.9.6, but it fails on a Linux box

X509_get_subject_name

2004-05-11 Thread Jeff Fulmer
Hello, I'm the author of siege. That program is dumping core on Red Hat systems in the following function: X509_get_subject_name Here's the function which calls it: BOOLEAN SSL_initialize(CONN *C) { #ifdef HAVE_SSL int serr; char *str; C-ssl= NULL; C-ctx= NULL; C-method =

RE: X509_get_subject_name

2004-05-11 Thread Bommareddy, Satish (Satish)
I think the X509_NAME_oneline takes a buffer and length for arguments 2 and 3. try buf[256]; str = X509_NAME_oneline(X509_get_subject_name(C-cert), buf, 256); see if that helps -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Jeff Fulmer Sent:

Re: Unknown Digest Type

2004-05-11 Thread Antonio Andrés Espallardo
Thanks a lot. It was what you commentted. I added add_all_algorithms() and went well.Thanks again.

Problem with newer snapshots

2004-05-11 Thread Frank
I'm writtign this but I know you will probably have no idea how to fix it or what the problem is all I can say is they with a newer snapshot of openssl we have a problem with core dumping and it works when compiled with older versions. Stack trace is as follows: #0 0x08087522 in BN_POOL_get