Hi,
I'm trying to create an RSA keypair with the RSA_generate_key function.
After seeding the PRNG with some random values, I call RSA_generate_key this way:
RSA *pRsa = RSA_generate_key(
1024, // key length
257, // exponent
progress, // shows progress
NULL //
Please ignore that message: I accidently linked against the OpenSSL library
while using libeay32.dll from the MKS toolkit :-/
-Oorspronkelijk bericht-
Van: Heusden van, FJJ (Folkert)
Verzonden: dinsdag 11 mei 2004 10:49
Aan: '[EMAIL PROTECTED]'
Onderwerp: RSA_generate_key: n/e/d and
Hi. Could anyone help me? I'm obtaining an error
when I try to sign an ASN1message with PKCS7_sign:
/***//*This
is the ASN1 message I need to sign*/ASN1NegotiationRequest
*prueba=nr-toASN1Object();
Util *util =
the problem disappear with 0.9.7d
-Messaggio originale-
Da: Fanton Flavio
Inviato: venerdì 7 maggio 2004 19.41
A: [EMAIL PROTECTED]
Oggetto: Problems whith smime -verify
Hi all,
We're using openssl 0.9.7a whith my Perl application to verify smime
message.
My application calls openssl
Hi,
I've successfully linked with the OpenSSL libraries (+ DAVLib) on the
Macintosh to produce an app which calls web services on an SSL enabled
server. I am running into problems when hitting the secure server via MS
Proxy.
I use the CONNECT xxx.xxx.xxx:443 syntax to establish an SSL tunnel and
Hi,
I have some code to extract a DNS field from subjectAltName extensions
in X509v3 certificates in the function below. It is based on example 5-8
in the book Network Security with OpenSSL by Viega, Messier and Chandra.
It seems to work fine when I use OpenSSL 0.9.6, but it fails on a Linux box
Hello,
I'm the author of siege. That program is dumping core on Red Hat
systems in the following function: X509_get_subject_name
Here's the function which calls it:
BOOLEAN
SSL_initialize(CONN *C)
{
#ifdef HAVE_SSL
int serr;
char *str;
C-ssl= NULL;
C-ctx= NULL;
C-method =
I think the X509_NAME_oneline takes a buffer and length for arguments 2 and 3.
try
buf[256];
str = X509_NAME_oneline(X509_get_subject_name(C-cert), buf, 256);
see if that helps
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Jeff Fulmer
Sent:
Thanks a lot. It was what you commentted. I added
add_all_algorithms() and went
well.Thanks again.
I'm writtign this but I know you will probably have no idea how to fix
it or what the problem is all I can say is they with a newer snapshot of
openssl we have a problem with core dumping and it works when compiled
with older versions.
Stack trace is as follows:
#0 0x08087522 in BN_POOL_get
10 matches
Mail list logo