On 27 July 2015 at 17:30, Andrew Carpenter wrote:
> Thanks again Richard for your help. I found out that I was using
> std::string::append in my code, and that append stopped reading when it
> reached a NULL byte in the signature(which is a valid byte given the hash
> function) and that was trun
Thanks again Richard for your help. I found out that I was using
std::string::append in my code, and that append stopped reading when it
reached a NULL byte in the signature(which is a valid byte given the hash
function) and that was truncating the signature.
On Fri, Jul 24, 2015 at 3:04 PM, Andr
Thanks so much for your response Richard. I appreciate your time. That's
pretty much the same thing I'm doing
On Fri, Jul 24, 2015 at 2:59 PM, Richard Moore
wrote:
>
>
> On 24 July 2015 at 19:30, Andrew Carpenter wrote:
>
>> Well That's interesting. when I download and use your .sig file
On 24 July 2015 at 19:30, Andrew Carpenter wrote:
> Well That's interesting. when I download and use your .sig file, I get
> the same errors. How do you go about picking up your signature form the
> file system?
>
>
Nothing special:
https://codereview.qt-project.org/#/c/113855/27/tests/auto/ne
Well That's interesting. when I download and use your .sig file, I get the
same errors. How do you go about picking up your signature form the file
system?
On Fri, Jul 24, 2015 at 11:55 AM, Richard Moore
wrote:
>
>
> On 24 July 2015 at 13:32, Andrew Carpenter wrote:
>
>> So my question is
On 24 July 2015 at 13:32, Andrew Carpenter wrote:
> So my question is: What format should the signature file be in?
> base64? DER? PKCS7? raw binary? Specifically I am talking about the
> function EVP_DigestVerifyFinal(), What format should the *sig parameter be
> in? The DiestVerifyInit an
Hello,
I am trying to verify a signature using
EVP_digestVerifyInit/Update/Final, and I keep getting the errors
ASN1_get_object:too long or ASN1_CHEKC_TLEN: Bad Object Header or Wrong
Tag, and finally ASN1_ITEM_EX_D2I: Nested asn1 error. I believe that these
errors indicate that the formatting
On Wed, May 11, 2005, Andreas Hoffmann wrote:
>
> >To see the format used you can do:
> >
> >openssl rsautl -verify -certin -in signature -inkey cert.pem -hexdump
> >
> >and post the result. Also try it with the -asn1parse option instead of
> >-hexdump.
> >
> >
> >
> >
> # openssl rsautl -verify
To see the format used you can do:
openssl rsautl -verify -certin -in signature -inkey cert.pem -hexdump
and post the result. Also try it with the -asn1parse option instead of
-hexdump.
# openssl rsautl -verify -certin -in signature -inkey vpn_test_konz.pem
-asn1parse
Error in encoding
15952:e
On Wed, May 11, 2005, Andreas Hoffmann wrote:
> The "signature" contains the value which is extracted from the
> socket-datastream and is 128Bytes (1024bit) long.
> What is in a signature in DER format? - Is it just the signature itself
> or is there additional information?
>
> What do the erro
make this test to see exactly what you have as
errors.
if (err != 1) {
ERR_print_errors_fp (stderr);
exit (1);
}
Abdou,
That's almost exactly how I got the errors
I did:
sig_err = EVP_VerifyFinal(md_ctx, signature, signature_length, pkey);
printf("Signature-Verification: %d\n",
make this test to see exactly what you have as
errors.
if (err != 1) {
ERR_print_errors_fp (stderr);
exit (1);
}
Abdou,
__
Découvrez le nouveau Yahoo! Mail : 250 Mo d'espac
The "signature" contains the value which is extracted from the
socket-datastream and is 128Bytes (1024bit) long.
What is in a signature in DER format? - Is it just the signature itself
or is there additional information?
What do the error-messages mean -
- Is there some problem while verifying (
I think that the format of the signature make problem,
normally the standard format of signature is a DER
format.
Abdou,
__
Découvrez le nouveau Yahoo! Mail : 250 Mo d'espace de stockage pour
Nils Larsch wrote:
Andreas Hoffmann wrote:
...
md_ctx = EVP_MD_CTX_create();
EVP_VerifyInit_ex(md_ctx, EVP_sha1(), NULL );
EVP_VerifyUpdate(md_ctx, data, data_length);
sig_err = EVP_VerifyFinal(md_ctx, signature, signature_length, pkey);
if (sig_err == -1) {
printf("An error occured while ve
Andreas Hoffmann wrote:
...
md_ctx = EVP_MD_CTX_create();
EVP_VerifyInit_ex(md_ctx, EVP_sha1(), NULL );
EVP_VerifyUpdate(md_ctx, data, data_length);
sig_err = EVP_VerifyFinal(md_ctx, signature, signature_length, pkey);
if (sig_err == -1) {
printf("An error occured while verifying the signatu
Hi,
I'm trying to verify a signature using the following code:
BIO* cert_bio;
X509 *cert;
X509 * x509;
EVP_PKEY * pkey;
EVP_MD_CTX *md_ctx;
int sig_err;
cert_bio = BIO_new_file("vpn_test_konz.pem", "r");
if (cert_bio == NULL) {
printf("error reading PEM-file\n");
exit(1);
}
cert = PEM
17 matches
Mail list logo