Hi Harald,
ThankQ for the information , but my doubt is if I do signing at sender side
with a flag (PKCS7_sign(x509 , priv , NULL , in , PKCS7_DETACHED)), then at
receiving side when I am doing verification how can I will be knowing that
the sender has sent the data with the flag PKCS7_DETACHED ..
Hello,
[EMAIL PROTECTED] wrote on 04/21/2008 10:45:18 PM:
>
> Hi,
>
> I need to DER encode an RSA public key as a SubjectPublicKeyInfo. The
ASN.1 definition
> of SubjectPublicKeyInfo is
>SubjectPublicKeyInfo ::= SEQUENCE {
> algorithmAlgorithmIdentifier,
> s
Thank you all for your valuable inputs. I really appreciate your sharing
your thoughts with me and am digesting them.
Right now it looks the easiest for me is static linking + baking my
trusted root CAs into a single cert file + validating the file before
using it. I also need to figure out a way
Hi Shankar,
if you're dealing with OFTP2 (I assume you're implementing this
because of older posts refering to the protocol and its RFC), you may
inspect the field SFIDSEC. Taken from the RFC 5024, ch. 5.3.3:
Value: '00' No security services
'01' Encrypted
Hi,
I need to DER encode an RSA public key as a SubjectPublicKeyInfo. The ASN.1
definition of SubjectPublicKeyInfo is
SubjectPublicKeyInfo ::= SEQUENCE {
algorithmAlgorithmIdentifier,
subjectPublicKey BIT STRING }
According to rfc 3279, the bit string subj
Hi ..
When we sign a file using pkcs7_sign with the given set of flags , how does
the receiver know and have to use the appropriate flag for verification ..
--
--Best Regards
Shankar
* Li, Yvonne wrote on Fri, Apr 18, 2008 at 23:46 -0400:
> You have lots of good points. Thank you again.
>
> I work for AOL, developing cross platform SDK for instant messaging that
> supports plugins. Plugins can be malicious. And AOL is responsible for
> protecting users' identity and privacy. C
(OT)
* Badra wrote on Fri, Apr 18, 2008 at 17:03 +0200:
> I have also unsigned char B that stores a binary value. I need to
> convert it to hexadecimal, I do:
>
> char *table = "0123456789abcdef";
> int i;
> for (i=0; i {
> B[2*i+1] = table[B[i] & 0xf];
> B[2*i] = table[(B[i] & 0
This is CC'd to the openSSL ML as the question was raised there a
while ago and I promised I'd get back to that.
Sorry for the delayed response - as we are migrating our dev.
environment to facilitate multiplatform builds from MSVC2005 it took
quite a while
Hi,
I am new to using openssl, i see that we can verify a PEM file using the
"verify" command. How can we verify a PKCS12 file?. I am want to be able to do
this programatically.
I really appreciate your time on this.
Best Regards
Murthy
Hello,
I am using openssl with XAMPP and the "selfsigned" code from http://www.novell.com/communities/node/3488/create-self-signed-certificate-online
__
OpenSSL Project http://www.openssl.org
Use
A developer is using OpenSSL 0.9.8.a with default compile values and I need
to verify the Diffie-Hellman. Can anybody tell me what the default
specifications would be for DH? more specifically does it use Galois Field
2^n or p; or over Elliptic Curves 2^n or p?
thanks in advance,
Greg
---
Dear all,
I have my application that reads string initialized with an
hexadecimal value (ex. char unsigned *s="702570534A458BEF"), and a
function that takes an hexadecimal as input.
I want to convert s to hexadecimal, I do:
int i;
for (i=0; i= '0' && s[i] <= '9') {
t1=s[i] - '0';
Hi!
I found out where the problem was.
I'm using a thread pool service for serving client connections (not a separate
thread for each client).
Each
client has assigned a ClientPort object which provides some callback
methods for input and output processing. Appearantly my thread pool
object was ca
14 matches
Mail list logo