at 10:32 AM, Davide Simoncelli
netcelli@gmail.comwrote:
Hello Stephen,
thank you for your answer.
Two signs (generated with RSA_sign and openssl tool) are different, so I
guess the problem is private key. Private key is generated with openssl
utility and I fill RSA object
20, 2009 at 5:12 PM, Dr. Stephen Henson st...@openssl.orgwrote:
On Sun, Dec 20, 2009, Davide Simoncelli wrote:
Hello,
I'm trying to validate a sign of message digest, sent over a protected
channel. On one node digest has been generated by using
RSA_sign(NID_sha1,
digest
Hello,
I'm trying to validate a sign of message digest, sent over a protected
channel. On one node digest has been generated by using RSA_sign(NID_sha1,
digest, SHA_DIGEST_LENGTH, out, outLen, rsaPrivKey), where rsaPrivKey is
RSA private key extracted from PEM enceded file with
Hi users,
when should one use OPENSSL_malloc instead of classic malloc? And whare
are the differences between the two functions?
It happens to me that when I use the OPENSSL_malloc I've either
segmentation faults or memory leakages. Any help is appreciated.
Regards.
--
Davide
smime.p7s
:554)
- with cipher=NULL the second time (apps/enc.c:565) which actually
avoids the iv to be set (because the if in crypto/evp/evp-enc.c:109
fails).
Is it a kind of bug or the IV in an engine must be set other-way?
Thanks and regards.
--
Davide
smime.p7s
Description: S/MIME cryptographic
-DWHIRLPOOL_ASM -g
signverifysign/s verify/s
rsa 512 bits 0.000347s 1.64s 2882.1 0.6
rsa 1024 bits 0.001999s 2.40s500.2 0.4
rsa 2048 bits 0.012781s 5.60s 78.2 0.2
rsa 4096 bits 0.085893s 5.06s 11.6 0.2
--
Davide
Segmentation fault (core dumped)
Many thanks.
--
Davide
smime.p7s
Description: S/MIME cryptographic signature
Hi users,
is there an easy (or even a not-so-easy) way to use a crypto engine in a
TLS/SSL session? I'd like to use a crypto engine for asymmetric crypto
during the handshake and another engine the for symmetric crypto of data
during the session.
Anybody can help me?
Regards.
--
Davide
ever used it?
Thanks.
--
Davide
smime.p7s
Description: S/MIME cryptographic signature
.
If this is true, why on OpenSSL side everithing works fine?
the private encrypt function does something different ?
Thank you in advance
--
Davide
__
OpenSSL Project http://www.openssl.org
User Support
);
}
}
but the only thing I get is this:
-[ davide@bsd : ~/wip/fingerprint ]- $ gcc *.c -o fingerprint -lcrypto -lssl
fingerprint.c: In function `main':
fingerprint.c:322: syntax error before `X509_PUBKEY'
I'm using freebsd 4.6 release and OpenSSL 0.9.6a 5 Apr 2001.
Any suggestion?
Thanks in advance
It was done as
X509_PUBKEY *pk;
ASN1_OCTET_STRING *oc;
oc = ASN1_item_pack(pk, ASN1_ITEM_rptr(X509_PUBKEY), NULL);
Ok, I resolved in another way using a lot of code from openssh package.
Thanks to EveryBody.
Davide D'Amico
)?
--
Davide D'Amico [EMAIL PROTECTED]
/()`
\ \___ / | Linux - If U hate Microsoft
/- _ `-/ ' FreeBSD - If U love Unix
(/\/ \ \ /\
/ / | `\
O O
On Fri, 28 Jun 2002 09:15:40 +0300
Vadim Fedukovich [EMAIL PROTECTED] wrote:
On Thu, Jun 27, 2002 at 11:14:09PM +0200, davide wrote:
Hi,
How could I get a fingerprint from a RSA key?
DER-encode RSA public key and apply SHA1 on it,
output that 20 bytes as %02x.
OK for apply SHA1, but I
Hi,
I use different type of RSA keys to build a X509 Cert,
so I would like to add an extension to the certificate to
establish what kinda of key peer is using.
How could I do that?
Thanks in advance
--
Davide D'Amico [EMAIL PROTECTED
Receiver, InterScan has detected virus(es) in the e-mail attachment.
Date: Mon, 20 Aug 2001 14:29:02 +0200 (W. Europe Daylight Time)
Method: Mail
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
[EMAIL PROTECTED]
File: Emanuel.exe
Action: clean failed - deleted
Virus:
Receiver, InterScan has detected virus(es) in the e-mail attachment.
Date: Mon, 06 Nov 2000 10:37:02 +0100 (W. Europe Standard Time)
Method: Mail
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
File: Very Funny.vbs
Action: clean failed - deleted
Virus: VBS_LOVELETTER-O
17 matches
Mail list logo