L.S.
About a week ago, I mentioned in a post to this newsgroup a problem
building shared libraries for openssl0.9.7f on Linux.
I wondered whether others are able to build shared libs, or perhaps are
able to reproduce the problem.
Below you find specifics about my system and the build process.
T
On 4/1/05 8:20 AM, "Nils Larsch" <[EMAIL PROTECTED]> wrote:
> this of course reduces the key space for the private key, but if you
> really need a fixed size public key you need to do it.
Would it reduce security or be unsafe to simply prepend zero bytes after
calling BN_bn2bin to make it fill 12
prakash babu wrote:
Hello All,
I find some unreachable codes in OpenSSL 0.9.7f .
Their details are as follows.
*File:pk7_lib.c
Line: 187
*/break;
p7->d.signed_and_enveloped->enc_data->content_type
=OBJ_nid2obj(NID_pkcs7_data);
break;/
...
please create a ticket by send
Bob Bradley wrote:
On 4/1/05 1:57 AM, "Nils Larsch" <[EMAIL PROTECTED]> wrote:
the dh public key is the result of g**k mod p (k is the private key)
operation and hence may have less than BN_num_bytes(p) bytes (approx.
every 256 key should have <= 127 bytes).
I didn't realize that. Thanks for the
In message <[EMAIL PROTECTED]> on Fri, 01 Apr 2005 10:10:58 -0500, Joe Flowers
<[EMAIL PROTECTED]> said:
flowers> Please help me understand what's going on.
I think the first thing you should do is take a look at the TLS (TLS
is basically the newer version of SSL) specification, RFC 2246. It
ex
Please help me understand what's going on.
I've successfully used OpenSSL (latest released version - 0.9.7f) to
communicate with a https:// site. (See my pseudo-code at the bottom of
this message.) However, nowhere in my code is a public key for the
https:// site specified.
But, when I look at t
Hello, I am doing a high level library that use openssl and I need
know the nids and the openssl name of the all ciphers (symmetric and
asymmetric) and digests.
There is some maner to get these?
Thank you very much.
__
OpenSSL Pr
Yes, your pointer helped a lot.
Thanks a bunch.
Calista.
--- Beniamino Galvani <[EMAIL PROTECTED]> wrote:
> On Thu, Mar 31, 2005 at 08:13:19AM -0800, Calista
> wrote:
> > Thanks Erwann.
> >
> > I wrote a test program in CURL to get the CRL
> using
> > http. It worked. I have one more question t
On 4/1/05 1:57 AM, "Nils Larsch" <[EMAIL PROTECTED]> wrote:
> the dh public key is the result of g**k mod p (k is the private key)
> operation and hence may have less than BN_num_bytes(p) bytes (approx.
> every 256 key should have <= 127 bytes).
I didn't realize that. Thanks for the explanation.
On Apr 1, 2005, at 4:37 AM, alok wrote:
Can someone exactly explain why one cannot typecast a bio( ) to a UNIX
domain socket/IPC/fd?
I'll give this a shot.
Unix allows you to read() to and write() from stream-like objects such
as files, pipes, character devices, and various kinds of sockets
poly
Bob Bradley wrote:
I'm seeing DH_generate_key generate a public key that is 1 byte less than
expected (127 instead of 128 bytes for a 1024-bit key), but only
sporadically (about every 200-300 tries). I've written the following test
case that always fails for me in less than 300 iterations. I've onl
Can someone exactly explain why one cannot typecast a bio( ) to a UNIX
domain socket/IPC/fd?
-thanks
Richard Levitte - VMS Whacker wrote:
In message <[EMAIL PROTECTED]> on Wed, 30 Mar 2005 16:51:37 -0800, David Brock
<[EMAIL PROTECTED]> said:
dbrock-openssl> I'm fairly new to openSSL so forgive
Hello,
I'm only a few day old in this community. Please help me by answering
the following questions.
1) Assuming I already acquired the CA certificate. After receiving my
signed certificate from the CA, what's the sequence of the OpenSSL
API calls I should use to validate the signed
I'm seeing DH_generate_key generate a public key that is 1 byte less than
expected (127 instead of 128 bytes for a 1024-bit key), but only
sporadically (about every 200-300 tries). I've written the following test
case that always fails for me in less than 300 iterations. I've only
included error ch
Jules Colding wrote:
Hi all,
Excuse me for asking such trivial questions, but I am new to
cryptography.
Anyway, will a string still be a string if I encrypt it with an RSA
public key? I mean, will null or other non-printable characters be
present within the encrypted result or will the result be en
Hi all,
Excuse me for asking such trivial questions, but I am new to
cryptography.
Anyway, will a string still be a string if I encrypt it with an RSA
public key? I mean, will null or other non-printable characters be
present within the encrypted result or will the result be entirely
printable AS
16 matches
Mail list logo