On 4 December 2013 22:38, Dave Thompson wrote:
> In addition to the misplaced paren already noted, and also a surplus paren,
>
> which I’ll assume were typos since they wouldn’t have compiled,
>
I think it could compile (unless there is another surplus paren I
haven't seen?):
EVP_SignInit(ctx, E
http://nepotists.co.uk/g5-inf.htm
___
From: 翔 芦 12/5/2013 12:22:09 AM
http://nepotists.co.uk/g5-inf.htm
___
From: 翔 芦 12/5/2013 12:22:09 AM
In addition to the misplaced paren already noted, and also a surplus paren,
which I'll assume were typos since they wouldn't have compiled,
your test program won't ever succeed, because you aren't verifying
the same data you signed. You memset ver_data to all zero bytes,
and then use strlen(
> From: owner-openssl-users On Behalf Of Danyk
> Sent: Wednesday, December 04, 2013 12:26
> I used this , and it seems to work great (parsed it with ASN1):
>
> st_exts= sk_X509_EXTENSION_new_null();
> X509_REQ *x;
>
> /*add INTEGER EXT*/
> int1 = ASN1_
On 3 December 2013 10:36, Aastha Mehta wrote:
> Hello,
>
> I wrote a simple code to sign and verify using DSA keys, but I am facing
> some problem with verification and I cannot figure it out. This is the error
> I get:
> error:0A071003:dsa routines:DSA_do_verify:BN lib
>
> I know the error comes
I used this , and it seems to work great (parsed it with ASN1):
st_exts= sk_X509_EXTENSION_new_null();
X509_REQ *x;
/*add INTEGER EXT*/
int1 = ASN1_INTEGER_new();
ASN1_INTEGER_set(int1, 1);
os1 = M_ASN1_OCTET_STRING_ne
Please accept my post and make it available for comments. I am in urgent need
of help for configuring SSL on openLDAP
--
View this message in context:
http://openssl.6102.n7.nabble.com/Problem-in-configuring-SSL-in-OPENLDAP-tp47535p47557.html
Sent from the OpenSSL - User mailing list archive at
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi all,
the default cipher settings in OpenSSL prefer 3DES over AES-128. In
general, Triple DES with three independent keys has a key length of 168
bits, but due to the meet-in-the-middle attack, the effective security
it provides is only 112 bits
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi!
Due to a misunderstanding within the OpenSSL team we ran into trouble
with our mail and mailing service still hosted at the old server
(hopefully I will be able to complete the migration to the new server
over the Christmas break).
Caused by a so
Hello,
I wrote a simple code to sign and verify using DSA keys, but I am facing
some problem with verification and I cannot figure it out. This is the
error I get:
error:0A071003:dsa routines:DSA_do_verify:BN lib
I know the error comes from EVP_VerifyFinal, but I don't exactly know why.
My code
11 matches
Mail list logo