Hi,
I´m trying to connect to my vpn server, using tunnelblick, but thinking
this is a openssl stuff... may be I am wrong.
When connecting I got (XX is a placeholder) :
2020-12-22 17:32:49.423703 VERIFY ERROR: depth=0, error=format error in
certificate's notAfter field: C=es, L=P, O=XX, CN=
In openssl 1.1.1,
I see that this bn_mod_exp function is called from "rsa_ossl_public_decrypt"
:
566 if (!rsa->meth->bn_mod_exp(ret, f, rsa->e, rsa->n, ctx,
567rsa->_method_mod_n)) {
568 goto err;
569 }
so we are doing "f^(rsa->e)mod(rsa->n)" , this
On Tue, Dec 22, 2020 at 3:45 AM prudvi raj wrote:
>
> Hello all,
>
> We use a hardware accelerator to calculate BIGNUM rr = a^p mod m .(
> bn_mod_exp). I am trying to rewrite that logic for openssl 1.1.1. Code
> snippet of custom bn_mod_exp function:
> --
> if(rr->d)
> {
> OPENS
Hello all,
We use a hardware accelerator to calculate BIGNUM rr = a^p mod m .(
bn_mod_exp). I am trying to rewrite that logic for openssl 1.1.1. Code
snippet of custom bn_mod_exp function:
--
if(rr->d)
{
OPENSSL_free(rr->d);
}
rr->d = ( BN_ULONG * )( malloc( m->top * sizeo