While normally the original data before encryption gets signed, what is the
effect of signing the encrypted data? In this form, the verification can take
place without decrypting the data. Any pros and cons of this method?
Thanks
--
(~._.~) Öì Ⱥ Ó¢ (Qun-Ying) (65) 874-6643
( O )
Beware !!!
This file is infected with the VBS.LoveLetter virus !!!
Regards,
Olivier
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Achtung, die von Ihnen versandte Mail enthaelt entweder
einen Computer Virus oder mindestens eine beigefuegte Datei des Typs
BAT, CHM, CMD, COM, CPL, EXE, HLP, INF, INS, ISP, JAR, JS, JSE, LNK, MDB, MDE,
MSC, MSI, MSP, MST, OCX, PIF, PL, REG, SCR, SCT, SHB, SHS, VB, VBE, VBS, WSC,
WSF, WSH
und
Antigen for Exchange found Very Funny.vbs matching =*.vbs file filter.
The file is currently Deleted. The message, "fwd: Joke", was
sent from Gianluca Russo and was discovered in IMC Queues\Inbound
located at UAlbany/ADM/EMAIL.
Receiver, InterScan has detected virus(es) in the e-mail attachment.
Date: Mon, 06 Nov 2000 10:37:02 +0100 (W. Europe Standard Time)
Method: Mail
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
File: Very Funny.vbs
Action: clean failed - deleted
Virus: VBS_LOVELETTER-O
I would like to know is there is an easy way of making blind signatures
with openssl. I need a text string to be signed but I don`t want the
server that is going to sign this text string to know it.
Openssl uses blinding in RSA but it is used to avoid timing attacks.
Thanks in advanced.
On Mon, Nov 06, 2000 at 03:50:02PM +0100, Stephane Bortzmeyer wrote:
I have a program (whose purpose is to test and benchmark Web servers) which
can loop over a given server. During the loop, what should I close/free? Since
there is apparently no documentation of the API (if I'm wrong, I pay
At 03:50 PM 11/6/00 +0100, Stephane wrote:
Since
there is apparently no documentation of the API (if I'm wrong, I pay a beer
for any pointer to actual documentation),
Did you check the "documentation" section of the
website listed below in the maillist signature?
On Monday 6 November 2000, at 10 h 3, the keyboard of Tom Biggs
[EMAIL PROTECTED] wrote:
Did you check the "documentation" section of the
website listed below in the maillist signature?
It's just the list of the prototypes of the functions... Without any semantic
information.
Joshua,
Thank you for the response.
The LD_LIBRARY_PATH had been set fine.
What I did was download the full release of openssl and use gcc instead.
There also seems to be an issue with the patch-level of the OS for Solaris
2.6. It works on a machine with kernel level 105181-23, but not
I'm sorry
!
I
apologizeforthe virus I sent to the comunity.I'm a victim
too.
excuse me
!
Gianluca
I am resending this message :::
Hello, I am receiving the following error with openssl 0.9.6..
-
./openssl genrsa -des3 -out server.key 1024
warning, not much extra random data, consider using the -rand option
I'm having a bitch of a time getting client verification to work to work.
I've got the root CA cert, project CA cert, and server and client certs (keys
with passphrase removed) all in pem encoded format. I've done the following.
1.Created a new mod_ssl instance of apache
2.Set the server key
I'm trying to write a package that links to the OpenSSL libs on the C side
and communicates with another server that will be running Java's JCE. I can
get the two to talk using DES ECB (and I expect Triple DES, but haven't
tried that yet.) This is because both sides internally agree to use PKCS5
Erwann ABALEA wrote:
[...]
I thought that using Pine solved the problem of viruses... I was
wrong... Even the simple 'mailx' can be exploited... and I don't have any
multimedia extension to Pine... ;-)
I know this is drifting off-topic, but I'm curious.
Our corporate gateway apparently
[EMAIL PROTECTED] wrote:
I'm having a bitch of a time getting client verification to work to work.
I've got the root CA cert, project CA cert, and server and client certs (keys
with passphrase removed) all in pem encoded format. I've done the following.
1.Created a new mod_ssl instance
Mathew,
Sounds like certificate problems. I've set up the nsopenssl module for
AOLserver to do what you're trying to do, so I know that at least OpenSSL
0.9.5a works ok in this regard. I've taken the Dept of Defense root CA and
second level CA and made them available to the web server for
Hi
sorry for the newbie question, but when I run make, I get the following:
making all in crypto...
make[1]: Entering directory `/tmp/openssl-0.9.6/crypto'
( echo "#ifndef MK1MF_BUILD"; \
echo " /* auto-generated by crypto/Makefile.ssl for crypto/cversion.c */";
\
echo " #define CFLAGS
\"gcc
I am sorry for my unclear questions.
In a scenario that the signature is stored in PKCS#7 format which is encrypted
with the recipient's public key. While the data is encrypted with 3DES.
If the data are to be stored in its encryption form and only decrypted when its
in use, does the
Suggestions for building the latest version of OpenSSL for MacOS X PB? Currently
installed version is 0.95a (I think), but it doesn't have the includes and such that
are needed to compile "cURL" with ssl support...
Help?
-KenS
Has anybody ever used profiling(CFLAGS=-pg) to analyze the amount of time
spent in each routine in openssl? I tried it in openssl-engine-0.9.6. But
the option -pg seemed to conflict with the option of -fomit-frame-pointer,
so I got rid of the latter. But when I tried to do speed
Hi
sorry for the newbie question, but when I run make, I get the following:
Your build environment is corrupt. It's not OpenSSL's fault.
/usr/include/bits/errno.h:25: linux/errno.h: No such file or directory
Seems like '/usr/include/bits/errno.h' refers to a
22 matches
Mail list logo