Hi,
Yes it
is possible to change OpenSSL to do this (I've just done it), but it's a bit
fiddly. Try BIO pairs first though.
Steve
-Original Message-From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]On
Behalf Of Steve CollinsSent: 30 May 2003 19:53To:
[EMAIL PROTECTED]Sub
Nils (or anyone else),
I know this was a while ago but I just got back to it. The one thing that
I don't understand about the calls to EC_POINT_mul() and EC_POINTs_MUL() are
what is n & m? Are they some aspect of the curve being used? Ar they the
affine coordinates of the other point? all I
Hi,Steve
Thanks a lot.
Now I know where I am wrong.
>Now the responder's certificate doesn't have to be unique. In the
example of>the CA signing the response the responders certificate will be
the CAs>certificate.
I always think every one (CA or responder , if they are different ) has
t
On Mon, Jun 02, 2003, Wu Junwei wrote:
> Hi,Steve,
>
> Thanks for your kindly answer.
>
> But, I am still not very clear.
>
> In my understinding
>
> I think responder may be not the signer of the reponse because the CA of
> the certificate in question can sign the response itself.
>
> The
On Mon, Jun 02, 2003, Wu Junwei wrote:
> Hi,all
>
> I have a question about the certificate verifying.
> I know OpenSSL has provided the X509_verify_cert() to do this function.
> And I should use X509_STORE_CTX_init() to do the initialization work.
> But I now have only the certificates s
I need to implement openssl into an embedded system, and I have read that RC5
uses only primitive computational operations commonly found on microprocessors.
My other option was Blowfish, 'cause it can run in few kb of memory (around 5K)
Could you suggested me anything?
Thanks
Ana
uoting [EMA
(B
(B
(BHi,all
(B
(B I have a question about the certificate verifying.
(B I know OpenSSL has provided the X509_verify_cert() to do
(Bthis function.
(BAnd I should use X509_STORE_CTX_init() to do the initialization
(Bwork.
(BBut I now have only the certificates stack and no
Hi,Steve,
Thanks for your kindly answer.
But, I am still not very clear.
In my understinding
I think responder may be not the signer of the
reponse because the CA of the certificate in question can sign the response
itself.
The public key got from the responder's certificate
i
Hi
thanks for replying
but problem is that after making an ssl connection,
whatever i read at the server side using read() or
recv() (on the socket from which i get the ssl
connection) I get blank data. and nothing is
displayed.
Any ideas??
thanks
manoj
--- Jan Kleinsorge <[EMAIL PROTECTED]> wr
> > Specifically i was wondering if there exists
> > functions for simple public/private encryption/decryption similar to
> > RSA_public_encrypt() and RSA_private_decrypt().
>
> No. The OpenSSL elliptic curve implementation currently
> supports only the basic arithmetic functions for elliptic cur
On Sunday 01 June 2003 20:00, Henrik N. Rask wrote:
> I am trying to figure out exactly how much support for elliptic curve
> cryptography exists in the 0.9.8 snapshots (the lack of documentation is
> making this a bit difficult).
Hopefully this will change when 0.9.8 is released :-)
> Specifical
Well I'm fumbling my way through this right now myself. Nils is the expert (he
wrote it). but look in the crypto/ecdsh directory and look at the test
programs. They might help.
Frank
"Henrik N. Rask" wrote:
> I am trying to figure out exactly how much support for elliptic curve
> cryptography e
I am trying to figure out exactly how much support for elliptic curve
cryptography exists in the 0.9.8 snapshots (the lack of documentation is
making this a bit difficult). Specifically i was wondering if there exists
functions for simple public/private encryption/decryption similar to
RSA_public_e
13 matches
Mail list logo