Hello,
> is this the best way to do it ? EVP_pkey *pkey = EVP_PKEY_new();
> EVP_PKEY_assign_RSA(pkey, rsa); thanks !
I think this one of most "proper" way :-)
Best regards,
--
Marek Marcola <[EMAIL PROTECTED]>
__
OpenSSL Projec
is this the best way to do it ?
EVP_pkey *pkey = EVP_PKEY_new();
EVP_PKEY_assign_RSA(pkey, rsa);
thanks !
> From: [EMAIL PROTECTED]
> To: openssl-users@openssl.org
> Subject: RE: Converting RSA to EVP_pkey
> Date: Thu, 26 Jul 2007 16:16:36 -0700
Thanks Marek, so then how do i convert RSA to EVP_pkey ? > Subject: Re:
Converting RSA to EVP_pkey> From: [EMAIL PROTECTED]> To:
openssl-users@openssl.org> Date: Fri, 27 Jul 2007 01:09:59 +0200> > Hello,> >
2) I was looking and found this d2i_RSAPrivateKey. From what it looks> > like,
this do
Hello,
> 2) I was looking and found this d2i_RSAPrivateKey. From what it looks
> like, this doesn't seem to be what i want. and i was wondering when
> what does this convert to and from.
This function convert from DER format to INTERNAL format (RSA).
Best regards.
--
Marek Marcola <[EMAIL PROTE
Hi,I have a RSA * to a private key and want to convert it to an EVP_pkey. 1)
Is there a way to convert from RSA to EVP_pkey.would the following function
the right candidate to do the job EVP_PKEY *PEM_read_bio_PrivateKey(BIO
*bp, EVP_PKEY **x,pem
50 ms is a common standalone ACK timer, so if one had a second or Nth small
send, it might have been waiting (via Nagle) for the remote's standalone ACK
before being transmitted. Some folks like to simply switch-off nagle, I prefer
to try to get folks to send logically associated data to the tr
David Lobron wrote:
2007-07-26 20:18:04.375 [3317] GS: Got response from sendDataPending
2007-07-26 20:18:04.376 [3317] GS: Calling poll with timeout 6
2007-07-26 20:18:04.376 [3317] GS: Checking poll results
2007-07-26 20:18:04.376 [3317] GS: calling SSL_write on buffer of length
1281
2007
Thank you for the quick reply, and apologies for my less-than-clear
message: let me give more details.
I am poll-ing with a timeout of 60 seconds, and SSL_write is
returning a positive number of bytes read each time through (we
always find data well before the timeout). The server logs for
TLS: error:140D308A:SSL routines:TLS1_SETUP_KEY_BLOCK:cipher or hash
unavailable ../../../../common/openssl/ssl/t1_enc.c:461
A little history I have compiled openssl version 0.9.8e on Sun v420 system
running opensolaris (version 11).
I used the gcc 3.4.3 compiler loaded in /usr/sfw/bin.
I then c
Prabhu S wrote:
Hi David,
I enabled the debug flags in the OpenSSL makefiles and recompiled for
the libraries.
The stack trace is obtained is as follows:
#0 0x4402 in __kernel_vsyscall ()
#1 0x001fc1f8 in raise () from /lib/libc.so.6
#2 0x001fd948 in abort () from /lib/libc.so.6
#3 0x
> I have a Linux server application that calls SSL_write in a loop, and
> polls the underlying socket using the poll(2) system call. In the
> loop, the first few calls to poll return immediately with data on the
> socket, but I'm finding that the last call to poll always takes about
> 50ms to bef
TLS: error:140D308A:SSL routines:TLS1_SETUP_KEY_BLOCK:cipher or hash
unavailable ../../../../common/openssl/ssl/t1_enc.c:461
A little history I have compiled openssl version 0.9.8e on Sun v420 system
running opensolaris (version 11).
I used the gcc 3.4.3 compiler loaded in /usr/sfw/bin.
I then c
Hello,
Does OpenSSL put length constraints on the length of subject DN of
X.509certificate?
If not, what is the maximum length of the subject DN string?
Thanks in advance,
Arsen.
Hello All-
I have a Linux server application that calls SSL_write in a loop, and
polls the underlying socket using the poll(2) system call. In the
loop, the first few calls to poll return immediately with data on the
socket, but I'm finding that the last call to poll always takes about
5
Please look at the code I released a few weeks ago that will show you
how to decode just such a thing. I sent it out on the openssl-users
mailing list.
Peace,
Chuck Wegrzyn
On 7/26/07, edkulus <[EMAIL PROTECTED]> wrote:
Hi All,
I have the following piece of code, that I use for reading the co
Hi All,
I have the following piece of code, that I use for reading the contents of
X.509 extensions:
X509 *cert = NULL;
X509_EXTENSION *extension;
ASN1_OCTET_STRING *extdata;
char *extname;
for (i = 0; i < X509_get_ext_count(cert); i++)
{
extension = X509_get_ext(cert, i);
extdata = X509_
Hi all!
In the openssl documentation I found the command "ts" for timestamping
actions. Trying this command with my openssl 0.9.8e I was told that this
is an unknown command.
Now I am wondering if the documentation may be some kind of too uptodate
- what is normally not the case with docs - or if
On Thu, Jul 26, 2007, Prabhu S wrote:
> Hi David,
>
> I enabled the debug flags in the OpenSSL makefiles and recompiled for the
> libraries.
> The stack trace is obtained is as follows:
>
> #0 0x4402 in __kernel_vsyscall ()
> #1 0x001fc1f8 in raise () from /lib/libc.so.6
> #2 0x001fd948 i
Hi David,
I enabled the debug flags in the OpenSSL makefiles and recompiled for the
libraries.
The stack trace is obtained is as follows:
#0 0x4402 in __kernel_vsyscall ()
#1 0x001fc1f8 in raise () from /lib/libc.so.6
#2 0x001fd948 in abort () from /lib/libc.so.6
#3 0x0023152a in __libc_
19 matches
Mail list logo