hello openssl-users.
i have problem in setting up openssl-0.9.6b
i tryed
> perl Configure VC-WIN32
> ms\do_ms
> nmake -f ms\ntdll.mak
and i have this message.
link /nologo /subsystem:console /machine:I386 /opt:ref /dll /out:out32dll\libeay32.dll
/def:ms/LIBEAY#@.def @C:\DOCUME~1\HYOUNG~1
Hi there,
On Friday 28 December 2001 12:49, Patrick Li wrote:
> Hi,
>
> I have implemented the SSL client and server applications and I will be
> using them to conduct SSL sessions. Since I have control on the client
> and the server, I want to find a cipher which offers strong encryption
> but
Hi,
I have implemented the SSL client and server applications and I will be
using them to conduct SSL sessions. Since I have control on the client and
the server, I want to find a cipher which offers strong encryption but does
not require a lot of CPU cycles. I think using TLSv1 protocol is the
Folks,
Trying to resolve a problem with the BIGNUM divide routine BN_div; could
someone check the code below and let me know if there is anything wrong with
code...
The code below is from openssl version 9.6B
int BN_div(..)
{
BIGNUM *snum;
BN_ULONG *wnump; /* a word number pointer ??
Ricardo Guerra wrote:
>
> hi,
>
> when i do this, i get a segfault on "RSA_check_key(&pubKey)", the public key
> is generated via cat priv.key | openssl rs -pubout > pub.key .. the real
> problem is using rsa_public_decrypt(), the decrypted data makes no sense.. so
> i wondered if the public key
On Thu, Dec 27, 2001 at 01:07:28PM -0500, Bill Rugolsky Jr. wrote:
> Perhaps I can find out what they are using to decrypt.
Well, the mail bounces from:
Microsoft Exchange Internet Mail Service Version 5.5.2650.21
Surprise, surprise, surprise. :-/
Regards,
Bill Rugolsky
___
hi,
when i do this, i get a segfault on "RSA_check_key(&pubKey)", the public key
is generated via cat priv.key | openssl rs -pubout > pub.key .. the real
problem is using rsa_public_decrypt(), the decrypted data makes no sense.. so
i wondered if the public key was correct, but using RSA_check_
Thanks, for your help. I will have to try it out when I get a chance,
as a higher priority job has been assigned to me.
On 23 Dec 2001 at 20:43, Joshua Chamas wrote:
> [EMAIL PROTECTED] wrote:
> >
> > I made sure Crypt::SSLeay was installed.
> > ppm -query yields Crypt-SSLeay [0.17.1]
> >
> >
Thanks for your reply. My work on this has been shelved for a
higher priority (Kerberos stuff, getting to play with all sorts of new
stuff) and letting the c coder duplicate the work. Unfortunately, the
machine is on an internal network, so I don't know how I could have
tested your suggestio
> Can OpenSSL decrypt such files OK and do the encrypted and decrypted
> versions match? What about OpenSSL decrypting Netscape or OE encrypted
> files?
Encryption/decryption with a 1MB file attachment using OpenSSL works fine.
Encrypting with OpenSSL and decrypting with Netscape works fine.
Encr
"Bill Rugolsky Jr." wrote:
>
> Hi,
>
> I'm trying to debug a problem that I'm having sending large attachments
> using OpenSSL 0.9.6b S/MIME encryption on Solaris 8, and am wondering
> if anyone has seen this problem before or would know where to look
> first.
>
> I wrap an ASCII text file (lon
Ricardo Guerra wrote:
>
> hi all,
>
> i have this piece of code, it crashes on PEM_write_RSA_PUBKEY (segfault),
> it's the same if i use PEM_write_rsa_PublicKey instead..
> does anyone have any idea about how to fix it?
>
> i've created the private key with openssl grnrsa -out priv.key 1024
>
On Thu, Dec 27, 2001 at 11:33:33AM -0500, Sankaran Narayanan wrote:
> > Out of curiosity, doesn't one also have to lock the SSL* itself against
> > concurrent access during read/write operations, or does OpenSSL guard it
> > for the programmer?
>
> sorry if i am spamming with naive questions, but
> Out of curiosity, doesn't one also have to lock the SSL* itself against
> concurrent access during read/write operations, or does OpenSSL guard it
> for the programmer?
sorry if i am spamming with naive questions, but:
Do i need locking, if all i do is 'read' in one thread (from remote) and
'
Out of curiosity, doesn't one also have to lock the SSL* itself against
concurrent access during read/write operations, or does OpenSSL guard it
for the programmer?
thanks,
jerry
-Original Message-
From: Sankaran Narayanan [mailto:[EMAIL PROTECTED]]
Sent: Thursday, December 27, 2001 10:
hi all,
i have this piece of code, it crashes on PEM_write_RSA_PUBKEY (segfault),
it's the same if i use PEM_write_rsa_PublicKey instead..
does anyone have any idea about how to fix it?
i've created the private key with openssl grnrsa -out priv.key 1024
thanks.
Ricardo
RSA *privKey ;
Hi,
I'm trying to debug a problem that I'm having sending large attachments
using OpenSSL 0.9.6b S/MIME encryption on Solaris 8, and am wondering
if anyone has seen this problem before or would know where to look
first.
I wrap an ASCII text file (longest line circa 157 char) in the form
of a MIM
> I am afraid that SSL_dup() does not fulfill your requirements.
> You can only have one datastream through one SSL object at a time,
> so that you cannot have two threads concurrently accessing one SSL object.
Thanks. It was fairly trivial to write a "reference counted" wrapper object
for SSL*,
On Wed, Dec 26, 2001 at 02:40:12PM -0500, Sankaran Narayanan wrote:
> I am adding TLS support to one of our servers, and for some legacy reasons
> i need to share the main SSL pointer across several threads. in the
> dispatcher thread i use SSL_dup and then allow the worker threads to
> free the d
19 matches
Mail list logo