Hello,
Is there a way to extract a public key from a PEM encoded file and turn it into
an EVP_PKEY struct? Also is there a way to directly extract the RSA data
directly from the file containing the public key and put it into an RSA struct?
Thank you,
Ben
Hi! I have some transport which based on winsock. Client(FTPS) send to
me some data over SSL, and i receive it with (for example):
...
if (WSARecv(AcceptSocket, DataBuf, 1, RecvBytes, Flags,
AcceptOverlapped, NULL) == SOCKET_ERROR){
if (WSAGetLastError() != WSA_IO_PENDING)
Greetings...
We are trying to sync up the SSL and LDAP configurations and we
are
having problems with the SSL certificates allowing Access when LDAP
has Locked the Account.
Do you have any suggestions ?
Thanks
Aaron Angel
--
NOTICE: The information contained in this
Let's assume that the public key is in a pem encoded X509 file called
x.pem
// Access the file
FILE*fptr=NULL;
fptr = fopen( x.pem, r );
// Read in the certificate to an X509 structure
X509*cert_A=NULL;
cert_A = PEM_read_X509_AUX( fptr, NULL,
Hi,
Does anyone know if there are any known issue with stunnel 4.05 and
oracle 10g (especially in retrieving blobs) ? . Our application uses
stunnel to communicate with oracle database. We are currently
experiencing massive performance degradation after upgrading oracle from
9i to 10g (almost 6
Hi! I have some transport which based on winsock. Client(FTPS) send to me some
data over SSL, and i receive it with (for example):
...
if (WSARecv(AcceptSocket, DataBuf, 1, RecvBytes, Flags,
AcceptOverlapped, NULL) == SOCKET_ERROR){
if (WSAGetLastError() != WSA_IO_PENDING)
On Fri, Apr 25, 2008 at 03:40:00PM +0300, Vladimir Sabanov wrote:
Hi! I have some transport which based on winsock. Client(FTPS) send to me
some data over SSL, and i receive it with (for example):
...
if (WSARecv(AcceptSocket, DataBuf, 1, RecvBytes, Flags,
AcceptOverlapped, NULL) ==
Hi! I have some transport which based on winsock. Client(FTPS)
send to me some data over SSL, and i receive it with (for example):
...
if (WSARecv(AcceptSocket, DataBuf, 1, RecvBytes, Flags,
AcceptOverlapped, NULL) == SOCKET_ERROR){
if (WSAGetLastError() != WSA_IO_PENDING)
For openssl 0.9.8e or higher, the default cipher is SHA2 instead of SHA1, isn't
it?
__
Looking for the perfect gift? Give the gift of Flickr!
http://www.flickr.com/gift/
On Fri, Apr 25, 2008 at 09:26:45AM -0700, PoWah Wong wrote:
For openssl 0.9.8e or higher, the default cipher is SHA2 instead of SHA1,
isn't it?
Neither is a cipher, and the default digest algorithm in 0.9.8 is SHA1
as opposed to md5 in 0.9.7 and earlier. There are no TLS ciphers that
use
http://www.openssl.org/docs/apps/ciphers.html has these cipher suites using SHA:
TLS_RSA_WITH_3DES_EDE_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA,
TLS_DHE_DSS_WITH_AES_256_CBC_SHA, etc.
Are the SHA in them all SHA1?
--- On Fri, 4/25/08, Victor Duchovni [EMAIL PROTECTED] wrote:
From: Victor Duchovni
On Fri, Apr 25, 2008 at 05:54:05PM -0700, PoWah Wong wrote:
http://www.openssl.org/docs/apps/ciphers.html has these cipher suites using
SHA:
TLS_RSA_WITH_3DES_EDE_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA,
TLS_DHE_DSS_WITH_AES_256_CBC_SHA, etc.
Are the SHA in them all SHA1?
Yes.
--
12 matches
Mail list logo