Hi,
In order to help you further, can you post :
- The data to be hashed which is the content of your variable xmlDat
- The signature to be verified which is the content of your variable
sigDat (maybe it's what you posted first)
- The public key that will be used for the verification
-
Synopsis:
Linking and execution problems with a FIPS-capable OpenSSL distribution.
System:
--
openSUSE 11.0 (i586)
Linux version 2.6.25.20-0.4-pae
gcc (SUSE Linux) 4.3.1
OpenSSL 0.9.8g 19 Oct 2007 (currently installed)
Includes are in /usr/include/openssl
Libs are in /usr/lib
Sebastián Treu wrote:
I used a select() thread with non-blocking IO just to no keep the cpu
busy in a infinite loop. Kind of:
while( alive CONTINUE )
{
/* The main client attendance */
copy = master;
if ( select(client-fd+1, copy, NULL,NULL,NULL) == -1)
On Sat, Nov 7, 2009 at 12:47 PM, David Schwartz dav...@webmaster.com wrote:
Your logic is backwards here. You are trying to decide whether or not to
read data on the decrypted output link, so why are you 'select'ing on the
encrypted input link?
SSL is a state machine, not a filter. The
Sebastián Treu wrote:
The main idea was avoid polling in an infinite loop consuming CPU
resources. I wrote that code thinking in: If the particular client
socket is calling our (thread) attention then fetchs the data. I
thought on that approach as I don't know another for non-blocking IO
Hi David,
On Sat, Nov 7, 2009 at 2:35 PM, David Schwartz dav...@webmaster.com wrote:
Sebastián Treu wrote:
The main idea was avoid polling in an infinite loop consuming CPU
resources. I wrote that code thinking in: If the particular client
socket is calling our (thread) attention then
How can I tell what the padding mode was before I attempt to decrypt data.
For example, when I use
RSA_private_decrypt(encsize,
encdata,
decdata,
privkey,
RSA_PKCS1_PADDING)
I'm getting some memory leaks when I use OpenSSL. I was not able to get rid
of these leaks, even when I use EVP_cleanup() and ERR_free_strings() at the
end of my program.
Memory Leak 1. PEM_read_PrivateKey()
=
EVP_PKEY* key = PEM_read_PrivateKey(fp,
Hi,
You simply can't guess the padding mode if you don't know it in advance.
Imagine the security consequences if this was possible : it would mean
that an attacker can have information about the clear text without
having access to the private key!!
Cheers,
--
Mounir IDRASSI
IDRIX
faturita rram...@gmail.com writes:
[...]
This is all very basic, and it is working but I am aware of the OpenSSL
multithreading (or not so) things and I would like to know if this basic
stuff
needs some form of synchronization
Not quite an answer to your question, but when faced with a
10 matches
Mail list logo