Re[2]: Capi engine

2010-03-01 Thread Игорь Дмитриев
Thanks for answer, Steve. May be you help me find way to attach Windows CryptoAPI to OPENSSL1.0.0 TLS methods. I am using OmniOrb4.1 and want replace current SSL transport implementation(in OPENSSL) with CryptoAPI calls. -Original Message- From: Dr. Stephen Henson st...@openssl.org To:

Re: PKCS#7 extract and verify certificate?

2010-03-01 Thread Steffen DETTMER
* Eisenacher, Patrick wrote on Tue, Feb 23, 2010 at 12:30 +0100: [...] The selection of a trust anchor is a matter of policy: it could be the top CA in a hierarchical PKI, the CA that issued the verifier's own certificate(s), or any other CA in a network PKI. And no, I don't need

Re: interoperability of C++ libcrypto and Java bouncy castle

2010-03-01 Thread Dr. Stephen Henson
On Sun, Feb 28, 2010, ashuahen wrote: I am using AES_CBC with padding (using PKCS#5 to pad) on C++ side: AES_set_encrypt_key( keyBuf, 128, key ) keyBuf contains key string key is the key generated Block Lenght is 16 AES_cbc_encrypt (ibuf, obuf, lenpad, key, iv, AES_ENCRYPT) ibuf =

Re: Crash in BIO_set_fp()

2010-03-01 Thread Michael Boman
I am using OpenSSL 0.9.8l from http://www.slproweb.com/products/Win32OpenSSL.html I link to these libraries for debugging: C:\OpenSSL\lib\VC\ssleay32MTd.lib C:\OpenSSL\lib\VC\libeay32MTd.lib And these ones for release: C:\OpenSSL\lib\VC\ssleay32MT.lib C:\OpenSSL\lib\VC\libeay32MT.lib I compile

Re: Another memory growing on AIX (fwd)

2010-03-01 Thread Mike Brennan
Tim Hudson wrote: Can you make a small test program which demonstrates this behaviour? Typically some cleanup code is being missed when this is sort of thing is raised; however a bit of test code makes it fairly easy to track down using a combination of the malloc

Re: Verify with RSA Public Key Fails

2010-03-01 Thread Paul Suhler
Does anyone else have any speculation on why I'm failing the padding check? I'm definitely using the public exponent and public modulus from the CAVP sample request file. After conversion to BIGNUMs, the bytes in the d, top, and dmax fields of each BIGNUM seem to be correct. I don't see

Re: Verify with RSA Public Key Fails

2010-03-01 Thread Dr. Stephen Henson
On Mon, Mar 01, 2010, Paul Suhler wrote: Does anyone else have any speculation on why I'm failing the padding check? I'm definitely using the public exponent and public modulus from the CAVP sample request file. After conversion to BIGNUMs, the bytes in the d, top, and dmax fields of each