Hi Friends,
Presently I am working on some code which uses the Openssl
0.9.8-dev version in which ECC support
was provided first time.Can anybody help me out from where I can get the
change log which tells me excactly
the changes made in that version upto latest version of
Abhishek Tripathi wrote:
Hi Friends,
Presently I am working on some code which uses the Openssl
0.9.8-dev version in which ECC support was provided first time.
0.9.8d has already been released
Can anybody help me out from where I can get the
change log which tells me
Hi Nils ,
Thanks for your guidance but I kindly bring to your notice that
0.9.8-dev doesn't stands for 0.9.8d .It's the first version in 0.9.8 series
before 0.9.8a.that's why I asked for change log
because a lot of changes are made in latest version comapre to that old
version .For e.g
I will be out of the office starting 11/22/2006 and will not return until
11/27/2006.
I will respond to your message when I return. If you require immediate
assistance, please contact the Campus Help Desk at [EMAIL PROTECTED]
Hi all,
Is there some API functions to base64 encode and decode strings?
I saw that base64 command is supported in openssl, (openssl base64
[options]), but I could not find any functions that I can call in my C, C++
application programs. Please guide.
Best regards,
Ambarish.
On Wed, Nov 22, 2006, Ambarish Mitra wrote:
Hi all,
Is there some API functions to base64 encode and decode strings?
I saw that base64 command is supported in openssl, (openssl base64
[options]), but I could not find any functions that I can call in my C, C++
application programs. Please
Hi all
I am using the OpenSSL version 0.9.8d
I am facing problem while using c_rehash script on powerpc(linux
kernel 2.6.10-WR1.2ci_gpp). I have cross compiled Openssl for PowerPC.
While creating the symbolic links for certificates by using c_rehash.
I am getting following warning. c_rehash is
RFC 2511 defines ASN.1 syntax for putting multiple certificate request
into one message:
CertReqMessages ::= SEQUENCE SIZE (1..MAX) OF CertReqMsg
CertReqMsg ::= SEQUENCE {
certReq CertRequest,
pop ProofOfPossession OPTIONAL,
-- content depends upon key type
Victor B. Wagner wrote:
RFC 2511 defines ASN.1 syntax for putting multiple certificate request
into one message:
[..]
Question is - how widespread is use of this syntax, is there any
real-world CA which understand CertReqMessages sequence.
There are several PKI implementations which support
Hi,
I'm decrypting using the EVP api and
I'm encountering the following error when i do a EVP_DecryptFinal
hashVerify:: ERROR error:06065064:digital envelope
routines:EVP_DecryptFinal_ex:bad decrypt
I have 2 questions
1) what's hashVerify got to do in the decryption process ?
2) any ideas
Abhishek Tripathi wrote:
Hi Nils ,
Thanks for your guidance but I kindly bring to your notice that
0.9.8-dev doesn't stands for 0.9.8d .It's the first version in 0.9.8
series before 0.9.8a.that's why I asked for change log
because a lot of changes are made in latest
On 2006.11.22 at 16:40:27 +0100, Michael Str??der wrote:
Victor B. Wagner wrote:
RFC 2511 defines ASN.1 syntax for putting multiple certificate request
into one message:
[..]
Question is - how widespread is use of this syntax, is there any
real-world CA which understand
Hi all,
How can I simply take an existing unencrypted client certificate and
add a password to it? In other words, do the opposite of:
openssl rsa -in pass.pem -out nopass.pem
thanks
Chris
__
OpenSSL Project
Hello,
How can I simply take an existing unencrypted client certificate and
add a password to it? In other words, do the opposite of:
openssl rsa -in pass.pem -out nopass.pem
openssl rsa -des -in nopass.pem -out pass.pem
Best regards,
--
Marek Marcola [EMAIL PROTECTED]
On 11/22/06, Marek Marcola [EMAIL PROTECTED] wrote:
Hello,
How can I simply take an existing unencrypted client certificate and
add a password to it? In other words, do the opposite of:
openssl rsa -in pass.pem -out nopass.pem
openssl rsa -des -in nopass.pem -out pass.pem
hmm, tried that:
Hello,
hmm, tried that:
openssl.exe rsa -des -in certnew.cer -out passcert.cer
unable to load Private Key
3752:error:0906D06C:PEM routines:PEM_read_bio:no start
line:.\crypto\pem\pem_lib.c:644:Expecting: ANY PRIVATE KEY
Probably your RSA key has DER format (not PEM), add option
-inform
Hello,
openssl.exe rsa -des -in certnew.cer -out passcert.cer
unable to load Private Key
3752:error:0906D06C:PEM routines:PEM_read_bio:no start
line:.\crypto\pem\pem_lib.c:644:Expecting: ANY PRIVATE KEY
Are you trying to encrypt X509 certificate ?
Why ?
Certificate are public, RSA keys are
On 11/22/06, Marek Marcola [EMAIL PROTECTED] wrote:
Hello,
openssl.exe rsa -des -in certnew.cer -out passcert.cer
unable to load Private Key
3752:error:0906D06C:PEM routines:PEM_read_bio:no start
line:.\crypto\pem\pem_lib.c:644:Expecting: ANY PRIVATE KEY
Are you trying to encrypt X509
Hello,
OK, perhaps I need to explain this more. I have a client cert
scenario where in order to verify the client's identity a certificate
is used instead of a username / password. I would not like for anyone
to be able to just grab the client certificate and impersonate, so I
would like to
Hi,
I have just read again the openssl archive back to 2001 but didn't find exactly
a clue to my pb.
In fact, we installed a OpenSSL port on a z/OS. No problem with compilation,
the product works well.
It works well BUT !
But we encounter a pb with signature when we try to verify a signature
On Thu, Nov 23, 2006, Dominique Blas wrote:
Hi,
I have just read again the openssl archive back to 2001 but didn't find
exactly a clue to my pb.
In fact, we installed a OpenSSL port on a z/OS. No problem with compilation,
the product works well.
It works well BUT !
But we encounter a
OK, perhaps I need to explain this more. I have a client cert
scenario where in order to verify the client's identity a certificate
is used instead of a username / password. I would not like for anyone
to be able to just grab the client certificate and impersonate, so I
would like to add a
On 11/22/06, David Schwartz [EMAIL PROTECTED] wrote:
OK, perhaps I need to explain this more. I have a client cert
scenario where in order to verify the client's identity a certificate
is used instead of a username / password. I would not like for anyone
to be able to just grab the client
I'm looking at an app where the app and all libs/DLLs it uses EXCEPT
openssl use ws2_32, and openssl uses wsock32. Is this a problem or can
the two coexist peacefully? It makes me somewhat uneasy.
If it is a problem, what does it take to rebuild OpenSSL 0.9.8d to use
ws2_32? I can diddle the
On Wed, Nov 22, 2006 at 09:31:35PM -0500, Chris Covington wrote:
I am most likely using the wrong terms (but I may be completely
confused, I admit). When one distributes client certificates to take
the place of usernames/passwords for authentication, how is that commonly
referred to?
One
On 11/22/06, Chris Covington [EMAIL PROTECTED] wrote:
On 11/22/06, Chris Covington [EMAIL PROTECTED] wrote:
On 11/22/06, David Schwartz [EMAIL PROTECTED] wrote:
OK, perhaps I need to explain this more. I have a client cert
scenario where in order to verify the client's identity a
On 11/22/06, Victor Duchovni [EMAIL PROTECTED] wrote:
On Wed, Nov 22, 2006 at 09:31:35PM -0500, Chris Covington wrote:
I am most likely using the wrong terms (but I may be completely
confused, I admit). When one distributes client certificates to take
the place of usernames/passwords for
Hi Nils,
Now you got my point but the code on which I am working uses the
too much internals of those structures .That why I needed the change
log.Inold OpenSSL code for the EC_KEY_METH_DATA they used some
ECDSA_DATA_new() as
follows
EC_KEY *key ;
/*
some code
*/
Hi
*I wanna run the loading test using crypto/threads/mttest.c*
I use the command below:
mttest -threads 5000 -loops 10
After 2 or 3 hours, the mttest crashed.
The environment is solaris 9.The description of core file is as followed:
core 'core' of 9702:./mttest -threads 5000
29 matches
Mail list logo