try -L/path/to/crypto/lib in front of -lcrypto
LDB
Marcos Paraiso wrote:
I used the command --> gcc -o test test.c -lcrypto <-- and the
following message was prompted:
C:\MinGW\bin\..\lib\gcc-lib\mingw32\3.2.3\..\..\..\..\mingw32\bin\ld.exe:
cannot find -lcrypto
This is the structure of MinGW o
My app does not have the ability of removing CRLs at runtime, although it
can add new ones. When I've determined that the CRL database needs refreshed
for OpenSSL, I just call X509_STORE_add_crl(cert_store, crl) for all CRLs
(regardless of whether or not they're already added to the X509_STORE) and
I used the command --> gcc -o test test.c -lcrypto <-- and the following message was prompted:
C:\MinGW\bin\..\lib\gcc-lib\mingw32\3.2.3\..\..\..\..\mingw32\bin\ld.exe: cannot find -lcrypto
This is the structure of MinGW on my HD:
C:\MinGW\BinC:\MinGW\includeC:\MinGW\libC:\MinGW\minGWC:\MinGW\minG
On Thu, Sep 09, 2004, Smith Baylor wrote:
> Changed code to:
>
> bio = BIO_new(BIO_f_base64());
> BIO_push(bio, mbio);
> int bytes_stored = i2d_PKCS12_bio(bio, p12);
> BIO_flush(bio);
>
> No effect still. I was also searching the archives and found this:
> http://www.mai
You may need to include -I /cygdrive/c/openssl/include or something
like that for including the necessary header files.
On Thu, 9 Sep 2004 20:59:23 +0200, Dunceor hmm <[EMAIL PROTECTED]> wrote:
> compile with:
> gcc -o test test.c -lcrypto
>
> - Original Message -
> From: Marcos Paraiso
Changed code to:
bio = BIO_new(BIO_f_base64());
BIO_push(bio, mbio);
int bytes_stored = i2d_PKCS12_bio(bio, p12);
BIO_flush(bio);
No effect still. I was also searching the archives and found this:
http://www.mail-archive.com/[EMAIL PROTECTED]/msg36055.html
This person was
compile with:
gcc -o test test.c -lcrypto
- Original Message -
From: Marcos Paraiso <[EMAIL PROTECTED]>
Date: Thu, 9 Sep 2004 15:25:09 -0300 (ART)
Subject: A little help please!!!
To: [EMAIL PROTECTED]
Hi everybody,
I just started studying the OpenSSL library and I already have a prob
On Thu, Sep 09, 2004, Smith Baylor wrote:
> A PKCS12 object is encrypted with a shared secret. When I use the
> function i2d_PKCS12_fp() to write to a file, it works, but, when I use
> this to store in a BIO and convert this into base64, it does only
> 2/3rds of it. Why is this? Any thoughts o
Hi everybody,
I just started studying the OpenSSL library and I already have a problem...
I´m using minGW and the OpenSSL package from http://www.slproweb.com/products/Win32OpenSSL.html
on Windows 2000.
I´m having problems when I try to compile a simple application, like the one below:
#includ
A PKCS12 object is encrypted with a shared secret. When I use the
function i2d_PKCS12_fp() to write to a file, it works, but, when I use
this to store in a BIO and convert this into base64, it does only
2/3rds of it. Why is this? Any thoughts or pointers?
Thanks
On Thu, 9 Sep 2004 08:32:36
Dr. Stephen Henson wrote:
>On Thu, Sep 09, 2004, Steve Hay wrote:
>
>
>>I'm afraid I don't know what "password based encryption" is, so I don't
>>know if this is the right thing to even be trying to do. It doesn't
>>sound like what I wanted...
>>
>>
>>
>
>It one of various standards which
I get these messages across all of my exposed servers. People are
knocking on the door to see if they can get in. Sometimes it's an
automated scan to gather data to see who is running what version of
SSH. (Ref: http://www.openssh.org/usage/index.html)
But, I think that the question is bette
On Thu, Sep 09, 2004, Charles B Cranston wrote:
> Perhaps one way to think of the IV is that it is part of the key.
> That is, the IV and key are used to encrypt, and then the (same) IV
> and the (same) key can decrypt. It's just that if the IV is sent
> in clear text ("included in the structure.
On Thu, Sep 09, 2004, Hellan.Kim KHE wrote:
> Using OpenSSL 0.9.7c
>
> I'm trying to parse an S/MIME encoded (signed) PKCS#7, but I simply can't get it to
> work with SMIME_read_PKCS7().
> I have the data in a memory BIO and I always get the error:
> error:0D06B08E:asn1 encoding routines:ASN1_d2
Charles B Cranston wrote:
>Perhaps one way to think of the IV is that it is part of the key.
>That is, the IV and key are used to encrypt, and then the (same) IV
>and the (same) key can decrypt.
>
IOW I could hard-code the IV into my source code, or use one supplied by
the user at build time (a
On Thu, Sep 09, 2004, Ralf Haferkamp wrote:
> Hi,
>
> I am currently trying to implement CRL checking inside a server. I am now
> facing the problem, that I would like to trigger a reload of the CRL from
> disc if it has been updated, without restarting the server application. How
> can that b
On Thu, Sep 09, 2004, Steve Hay wrote:
> Dr. Stephen Henson wrote:
>
> >On Thu, Sep 09, 2004, Steve Hay wrote:
> >
> >
> >
> >>I've no idea what the ASN1_TYPE *param is, or where to get one from. I
> >>had a look at EVP_CIPHER_param_to_asn1(), but it says that the cipher IV
> >>in the ctx pa
The way I did it was to delete my SSL_CTX and build a new one.
On Sep 9, 2004, at 7:38 AM, Ralf Haferkamp wrote:
Hi,
I am currently trying to implement CRL checking inside a server. I am
now
facing the problem, that I would like to trigger a reload of the CRL
from
disc if it has been updated, wit
BIO *mbio, *b64bio, *bio;
mbio = BIO_new(BIO_s_mem());
b64bio = BIO_new(BIO_f_base64());
bio = BIO_push(b64bio, mbio);
int bytes_stored = i2d_PKCS12_bio(bio, p12);
BIO_flush(mbio2);
BIO_get_mem_data(mbio, (unsigned char *)&p12_data_tmp);
Perhaps one way to think of the IV is that it is part of the key.
That is, the IV and key are used to encrypt, and then the (same) IV
and the (same) key can decrypt. It's just that if the IV is sent
in clear text ("included in the structure...") then it is not secret.
One popular algorithm is to u
Dr. Stephen Henson wrote:
>On Thu, Sep 09, 2004, Steve Hay wrote:
>
>
>
>>I've no idea what the ASN1_TYPE *param is, or where to get one from. I
>>had a look at EVP_CIPHER_param_to_asn1(), but it says that the cipher IV
>>in the ctx passed to it must be set when the call is made, which seems
Using OpenSSL 0.9.7c
I'm trying to parse an S/MIME encoded (signed) PKCS#7, but I simply can't get it to
work with SMIME_read_PKCS7().
I have the data in a memory BIO and I always get the error:
error:0D06B08E:asn1 encoding routines:ASN1_d2i_bio:not enough data
However, if I flush the data to a
Hello All,
in my server system log (/var/log/messages) i read:
Sep 7 13:05:39 sshd[18706]: Did not receive identification string from \
144.16.93.115
Sep 7 14:01:58 sshd[21432]: Connection closed by 144.16.93.115
Does 144.16.93.115 stand in my server about 1 h?
I use OpenSSL/0.9.6h. Do you thi
Hi,
I am currently trying to implement CRL checking inside a server. I am now
facing the problem, that I would like to trigger a reload of the CRL from
disc if it has been updated, without restarting the server application. How
can that be done. Is there any possiblity to remove a CRL for the X
Thanks that helped and worked.
--Smith
On Thu, 9 Sep 2004 15:04:10 +0200, Dr. Stephen Henson <[EMAIL PROTECTED]> wrote:
>
>
> On Thu, Sep 09, 2004, Smith Baylor wrote:
>
> > Hi,
> >
> > How can you create a STACK_OF(X509) object from a given X509 CA Cert?
> >
> > X509 *x509ca;
> > STACK_OF(X5
On Thu, Sep 09, 2004, Smith Baylor wrote:
> Hi,
>
> How can you create a STACK_OF(X509) object from a given X509 CA Cert?
>
> X509 *x509ca;
> STACK_OF(X509) *ca;
>
> x509ca = ReadX509Cert("file_name");
>
> Now how to populate the ca object with this x509ca object?
>
There is some old documen
Hi,
How can you create a STACK_OF(X509) object from a given X509 CA Cert?
X509 *x509ca;
STACK_OF(X509) *ca;
x509ca = ReadX509Cert("file_name");
Now how to populate the ca object with this x509ca object?
Thanks
__
OpenSSL Proje
On Thu, Sep 09, 2004, Steve Hay wrote:
> Steve Hay wrote:
>
> It occurs to me that I can make use of PKCS5_v2_PBE_keyivgen() for
> 0.9.4+, and just use EVP_BytesToKey() for earlier versions -- the fact
> that the latter doesn't support non-default key lengths isn't a problem
> because I can't
Thanks to Eric I found the problem. It was a simple programming error.
While I had malloced correctly to include a exta byte, I was storing
the null character in the string array incorrectly. I was doing
cert_data[bio_store_bytes +1] = '\0';
instead of cert_data[bio_store_bytes] = '\0';
Thanks
Thank you for your answer.
I don't know OpenSSL that well, so I just wanted to know if I was doing something
wrong or there were some "inconsistencies" in the OpenSSL code.
But now that I know it's a bug, I'll try to work around it.
Regards,
Kim
-Oprindelig meddelelse-
Fra: [EMAIL PROTEC
Steve Hay wrote:
>El hallabi-Kettani Abderrahmane wrote:
>
>
>
>>the function PKCS5_v2_PBE_keyivgen() exist in version
>>openssl0.7.9d in directory
>>openssl/crypto/evp/p5_crypt.c
>>it corresponds to what you want to do .
>>
>>
>>
>If you'd read my mail properly, you'd see that I'd already f
31 matches
Mail list logo