Hi,
I just created a key pair using:
RSA *rsa = RSA_generate_key(bits, RSA_F4, NULL, NULL);
assert(rsa);
...
EVP_PKEY *pkey = EVP_PKEY_new();
assert(EVP_PKEY_assign_RSA(pkey, rsa));
Now I want to get the public key in PEM format:
assert(EVP_PKEY_type(pkey->type) == EVP_PKEY_RSA);
hy does this problem still exist?
regards,
Manuel Schölling
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.
Hi,
anytime I use the SSL_VERIFY_PEER flag for my DTLS connections
(clientside, serverside, or on both sides) I get this error message:
d1_both.c(1046): OpenSSL internal errror, assertion failed:
s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH == (unsigned
int)s->init_num
Doesn't DTLS su
Hello,
I'm trying to implement a nonblocking dtls socket.
The code is implemented like
http://www.estacado.net/resip/sip/resiprocate/doxygen/html/DtlsTransport_8cxx-source.html
But my program aborts after receiving the first packet from an other
peer at SSL_read() with this error message:
d
Hi,
The DTLS paper keeps talking about how similar it is to TLS, but I
haven't really coded TLS either, so that doesn't help me much. A simple
DTLS example would help tremendously.
you can find a good example for nonblocking transfer here:
http://www.estacado.net/resip/sip/resiprocate/doxygen/
Hi,
I wanna write an peer2peer vpn client using the linux tun/tap device and
openssl (dtls) but I have a problem with the verification of the peer's
public key:
there is no trust center, so none of the peer's certificate is signed by
anybody else than the peer itself.
so I want to create a file in
Hi everybody,
I'm going to write a peer2peer-vpn linux client.
I wanna use OpenSSL's DTLS for transfering the data from one client to
an other.
Here is my problem:
When I send data with SSL_write just one udp packet (size: 119) is sent
and the server does not react on this.
Both (SSL_write cl