hi,
is there a way, given an EVP_CIPHER, to find out the human-readable
cipher name?
Best,
Misha
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
*Good Morning, Misha!*
I'm sorry, but I can't understand what you want. Please, can you explain?
To you see the ciphers installed in you system :
openssl ciphers -v
Link about ciphers :
- http://www.openssl.org/docs/apps/ciphers.html
*
Best Regards,
Mariana Hoffart Dias*
On Thu, Oct 22, 2009
On Thu, Oct 22, 2009, Misha Aizatulin wrote:
hi,
is there a way, given an EVP_CIPHER, to find out the human-readable
cipher name?
Try EVP_CIPHER_name(cipher) .
Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see:
On Thu 22/10/09 9:05 AM , Misha Aizatulin ava...@hot.ee sent:
is there a way, given an EVP_CIPHER, to find out the human-readable
cipher name?
EVP_CIPHER_name
Carl
__
OpenSSL Project
Hi All,
Here is the part of the code that was previously developed. The code
successfully extract a public key from some secure server, now I like to
know how to extract the exponent and modules of the public key
(rsa_public_key).
EVP_PKEY *public_key = NULL;
RSA *rsa_public_key =
what about
rsa_public_key-n
and
rsa_public_key-e
You could do
BN *n = BN_dup(rsa_public_key-n);
BN *e = BN_dup(rsa_public_key-e);
And do what you want with them (don't forget to free them)
If you are wanting to display them
char *n_txt = BN_bn2dec(n);
char *e_txt = BN_bn2dec(e);
or
I have a server which reads/writes a socket independently; that is to say, at
the same time (not a request-response model). I note in the FAQ it says I must
not allow multiple threads to use an SSL connection, so clearly if my sockets
are blocking I cannot support full-duplex traffic (because
Hi all,
I am trying to debug a memory leak caused by X509_dup() and was
wondering if any body could offer some tips of how to troubleshoot
this further.
Basically, I have a template X509 structure, which I'm using as a base
for generating new X509 structures.
A brief example of what I am doing
On Thu, 2009-10-22 at 09:53 -0500, Steve Alstrin wrote:
Following is the out put from the fipsld shell sccript.
I followed the instructions for building the openssl-fips1.2 lib the
followed the instructions for building the opensll-0.9.8k lib refering
to the the fips lib. I can link a single
Doug: It is my understanding that the first byte of the public key is a flag
to indicate if the public key is compressed, uncompressed or hybrid:
-conv_form arg specifies the point conversion form
possible values: compressed
Hello,
I'm writing a server application using openssl 0.9.8k. Is it possible to
setup openssl to ignore a client initiated renegotiation?
Thanks,
Carl
__
OpenSSL Project http://www.openssl.org
Jason Pettiss wrote:
I have a server which reads/writes a socket independently; that is to
say, at the same time (not a request-response model). I note in the
FAQ it says I must not allow multiple threads to use an SSL connection,
so clearly if my sockets are blocking I cannot support
On Wed, Oct 21, 2009, Adam Rosenstein wrote:
I'm using v1.0.0 Beta 3.
Hmm... there seems to be an SKID/AKID issue here:
ROOT (CA0)
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: sha1WithRSAEncryption
Issuer: O=Red Condor, OU=PKI, CN=CA0
Validity
Not Before:
David Schwartz wrote:
Jason Pettiss wrote:
I have a server which reads/writes a socket independently; that is to
say, at the same time (not a request-response model). I note in the
FAQ it says I must not allow multiple threads to use an SSL connection,
so clearly if my sockets are blocking I
From: owner-openssl-us...@openssl.org On Behalf Of sandeep kiran p
Sent: Wednesday, 21 October, 2009 23:06
(fairly OT: MS Visual Studio)
Thanks Dave. I figured out how to do this. I first built a static
version
of libeay32 and ssleay32 using ms\nt.mak (added /Zi and
15 matches
Mail list logo