Hi
I got the three certificates from the CA authority (Signed by VeriSign).
I am trying to sign these 3 certificates with my local CA.I am able to
sign successfully the signed certificate from VeriSign. But for the
intermediate and root certificate of Verisign it is throwing the
error(Check that t
> 2. In RSA_test.c, the key1 has the n as
> "\x00\xAA\x36\xAB\xCE\x88\xAC\xFD\xFF\x55\x52\x3C\x7F\xC4\x52\x3F"
> "\x90\xEF\xA0\x0D\xF3\x77\x4A\x25\x9F\x2E\x62\xB4\xC5\xD9\x9C\xB5"
> "\xAD\xB3\x00\xA0\x28\x5E\x53\x01\x93\x0E\x0C\x70\xFB\x68\x76\x93"
> "\x9C\xE6\x16\xCE\x62\x4A\x11\xE0\x08\x6D\x34\x
Dear all:
I trace the RSA_test.c and found after RSADP but before
RSA_padding_check_PKCS1_OAEP, the bytes of decipher text is always less than
the module by 1.
I try several my private/public/cipher pairs to do the decryption but each
time the bytes of my decipher text before RSA_padding_check_PKC
Dear all:
I try to understand RSA-OAEP with rsa_test.c and I have some questions about
this file.
1. If the number is 1234567893456 in dec, that is 11F71FB11D0 in hec, how
should I put it in the static unsigned char n[]?
Should I put is as "\x1\x1F\x71\xFB\x11\xD0", I marked this one as order A,
or
On Mon, Dec 04, 2006, Marc Saegesser wrote:
> I have an existing application (which I don't control) that sends me files
> that were encrypted using an openssl comand like:
>
> openssl enc -e -des -pass pass:
>
> I would like to decrypt these files inside a Java application and generate
> respon
I have an existing application (which I don't control) that sends me files
that were encrypted using an openssl comand like:
openssl enc -e -des -pass pass:
I would like to decrypt these files inside a Java application and generate
response files that the client can decrypt using a similar opens
> This will probably look like a dumb question, but anyway. Is there
> any provision and way, in SSL and/or HTTP, to establish a SSL link
> without trying to assert anything about the server identity? Such
> that a client (a web browser) would happily use the encrypted tunnel
> while obviously n
Hello,
> Recently I installed pure-ftpd with TLS support.
>
> However, when I try to connect I get an answer like:
>
> Fatal error: SSL_connect: error:0D0680A8:asn1 encoding
> routines:ASN1_CHECK_TLEN:wrong tag
>
>
> Does any one have an ideia what is this? Where can be the problem? How
> to so
On Mon, Dec 04, 2006 at 12:14:59PM +0100, Olivier Mascia wrote:
> This will probably look like a dumb question, but anyway. Is there
> any provision and way, in SSL and/or HTTP, to establish a SSL link
> without trying to assert anything about the server identity?
TLS includes anonymous ciph
Just to throw my penny in.
Kingston Smiler wrote:
Thanx once again for your reply. I'm using OpenSSL 0.9.8d in my
application.
In the Client side I'm creating a new TCP non-blocking socket and then i'm
connecting the socket to the server side in the TCP level.
After successfully connectio
Hi Stephen,
It turned out that the problem was confusion caused by having root
certificates from a test CA and a production CA, both with the same DN
in the subject. The certificates were indeed different as the code was
reporting. I should have trusted it!
Thanks for your advice.
Dan.
--
Hello all.
Recently I installed pure-ftpd with TLS support.
However, when I try to connect I get an answer like:
Fatal error: SSL_connect: error:0D0680A8:asn1 encoding
routines:ASN1_CHECK_TLEN:wrong tag
Does any one have an ideia what is this? Where can be the problem? How
to solve?
Thank yo
Hello !
This will probably look like a dumb question, but anyway. Is there
any provision and way, in SSL and/or HTTP, to establish a SSL link
without trying to assert anything about the server identity? Such
that a client (a web browser) would happily use the encrypted tunnel
while obvi
Hi Folks.,
Am facing a persistant problem with Internet Explorer not able to talk to
SSL Server when configured with a DSA certificate. SSL CTX has the
set_tmp_dh_params enabled and the code looks pretty much correct as
Mozilla/Firefox/Opera is working fine with the exact same SSL Server
Configura
14 matches
Mail list logo