On Mon, Aug 27, 2012 at 10:50 PM, Dr. Stephen Henson wrote:
On Mon, Aug 27, 2012, GWu wrote:
The email is available at
http://www.buergerkarte.at/mvnforum/mvnforum/viewthread_thread,272#1180
(German language forum, but the email - or it's significant parts
respectively - is easily visble).
On Tue, Aug 28, 2012, GWu wrote:
On Mon, Aug 27, 2012 at 10:50 PM, Dr. Stephen Henson wrote:
On Mon, Aug 27, 2012, GWu wrote:
The email is available at
http://www.buergerkarte.at/mvnforum/mvnforum/viewthread_thread,272#1180
(German language forum, but the email - or it's significant
On Tue, Aug 28, 2012 at 1:07 PM, Dr. Stephen Henson wrote:
- ba 80 69 57 62 78 03 d4-57 3c 93 83 b9 86 f1 5a ..iWbx..W.Z
0010 - 35 23 58 3d
This isn't a proper DigestInfo structure at all it's just presumably the raw
SHA1 hash (as you can see from its length: 20 bytes). A proper
Hi all
I created a shared key based on a DH exchange and want to use that key
with a symmetric encryption algorithm. This key has a length of 16 Bytes
(128 bit). Here is what I do to initialize AES:
char *key,*iv;
// DH exchange which ends with a 16B value in key
RAND_pseudo_bytes(iv,16);
Sorry for the stupid questions, but
- does this file exist on your machine (and there is no typo in the name)?
- and does it have meaningful content (a key)?
Dear All,
I have installed OpenSSL and faces this given below error when try to tun
apache server. Kindly advice me on this, how to
This means you need to create a key pair (private key with no password +
X509 certficate) for apache to use.
Some linux distributions sometimes include a dummy key pair just for
testing.
On Fedora Core 14 these is a /etc/pki/tls/certs/make-dummy-cert command.
On 08/28/12 07:21, Jamshed
On Tue, Aug 28, 2012, GWu wrote:
Great, thanks a lot. I've been able to reproduce this on the erroneous
messages as well, and a correctly signed message gives for example
openssl rsautl -verify -certin -inkey s.pem -in sig.der -asn1parse
0:d=0 hl=2 l= 33 cons: SEQUENCE
2:d=1
On Tue, Aug 28, 2012, la...@angry-red-pla.net wrote:
Hi all
I created a shared key based on a DH exchange and want to use that key
with a symmetric encryption algorithm. This key has a length of 16 Bytes
(128 bit). Here is what I do to initialize AES:
char *key,*iv;
// DH exchange