Hi,
I did not know about the function EVP_PKEY *PEM'_read_PrivateKey(FILE *fp,
EVP_PKEY **pkey,pem_password_callback function *cb,void *u ) and it's
exactly what I need to use (very similar situation like the author of this
thread).
However, how could I use the EVP_PKEY after that ? Is there
2008/11/5 BiGNoRm6969 [EMAIL PROTECTED]
Hi,
I did not know about the function EVP_PKEY *PEM'_read_PrivateKey(FILE *fp,
EVP_PKEY **pkey,pem_password_callback function *cb,void *u ) and it's
exactly what I need to use (very similar situation like the author of this
thread).
However, how
Hooray, this question I can answer. (Maybe someone can answer mine
now?)
I dont know if it is a bad way, cryptographically, but it works.
//The bio to handle a char *
static BIO *memory_buf_BIO(const char* buf, int len)
{
BIO* bio;
BUF_MEM* mem;
if (!buf)
return NULL;
if (len ==
Am Montag, 15. September 2008 11:48:15 schrieb Dan Ribe:
Hi,
I have a client/server application, where client authenticate itself by
signing a random string (sent by server) using its private key. Whole logic
is working fine for me. I am using PEM_read_PrivateKey() function to read
the
On Wed 17 Sep 2008 (09:38 -0700), David Schwartz wrote:
Dan Ribe:
I am using the private key just to authenticate the client.
Once server has authenticated the client (by using the public
key of client), it will give access to that client.
If the application is a single process that
I am using the private key just to authenticate the client. Once server has
authenticated the client (by using the public key of client), it will give
access to that client. So I will say that in this case users of my client
application need not to have access to the private key (becasue this
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dan Ribe schrieb:
| I am using the private key just to authenticate the client. Once server
| has authenticated the client (by using the public key of client), it
| will give access to that client. So I will say that in this case users
| of my client
Dan Ribe:
I am using the private key just to authenticate the client.
Once server has authenticated the client (by using the public
key of client), it will give access to that client.
So you want the server to condition access to a resource based on what
software is being used, and to reject
Matthieu Herrb wrote:
Hi,
I'm new to this list, and I did not find anything obvious matching my
problem in the mail archives, so please excuse me if it's a FAQ or if
the question is silly.
I'm using OpenSSL 0.9.5a to sign messages with a certificate that I
have exported from Netscape