Hi,
Could someone shed some light on this above mentioned RSA bad signature
issue.
Thanks,
Senthil.
On Thu, Feb 23, 2017 at 12:31 AM, Senthil Raja Velu
wrote:
> Hi,
> I have recently updated my openssl server version from 1.0.1m to 1.0.2j.
> After updating the handshake fails with the client.
I have solved my create public RSA problem with this code:
printf( "Method 1\n" );
RSA* RSA1 = RSA_new();
RSA* RSA2 = RSA_new();
RSA2->n = RSA1->n = My_RSA->n;
RSA2->e = RSA1->e = My_RSA->e;
RSA2->d = RSA1->d = My_RSA->d;
RSA2->p = RSA1->p = My_RSA->p;
RSA2->q = RSA1->q = My_RSA->q
[ The openssl-security is for reporting security issues
in OpenSSL. Answer redirected to openssl-users. ]
> On Mar 12, 2017, at 3:55 PM, Oren Rosenmann wrote:
>
> As part of our software, we use OpenSSL 1.0.2 stream.
> Due to Sweet32 attacks, security scanners are suggesting
> upgrade to 1.1
In message <8CD5EEA9CC3F4643AAFC6D7DDF6EB449@OwnerPC311012> on Sun, 12 Mar 2017
16:15:47 +1100, said:
sisyphus1> -Original Message- From: Richard Levitte
sisyphus1> Sent: Sunday, March 12, 2017 3:25 PM
sisyphus1> To: openssl-users@openssl.org
sisyphus1> Subject: Re: [openssl-users] mingw