I tried to track down the problem, but it still seems that , when it
comes to certificate verification, on the OpenWRT fails what works on
a standard linux desktop PC. I wrote a short program that validates
certificates, that I'll append to this mail. If someone has some
MIPSEL platform ava
Hello,
[EMAIL PROTECTED] wrote on 05/26/2008 09:58:29 PM:
> Hello
>
> calling i2d_RSAPublicKey() I get on a linksys running OpenWrt kamikaze
> 7.09 the following errors.
> error:0D07207B:lib(13):func(114):reason(123)
> error:0D068066:lib(13):func(104):reason(102)
> error:0D07803A:lib(13):func(1
Thank you, that oppenssl errstr i didn know, it is really usfull
Thomas
[EMAIL PROTECTED] wrote:
Hello,
[EMAIL PROTECTED] wrote on 05/26/2008 09:58:29 PM:
Hello
calling i2d_RSAPublicKey() I get on a linksys running OpenWrt kamikaze
7.09 the following errors.
error:0D07207B:lib(13):func(
Hi all,
I have created the server and client certificates. But while
issuing the command *openssl verify -CAfile ca.crt server.crt*, it is
giving following error.
server.crt: /C=IN/ST=BANGALORE/O=Kalki Communication Technologies/CN=server
error 20 at 0 depth lookup:unable to get local issue
Am 26.05.2008 um 13:13 schrieb Lutz Jaenicke:
Till Elsner wrote:
Ok, after verifying what platform I'm actually compiling for, it's
definitely little-endian (Linksys WRT54G running on Broadcom
BCM4712).
So what else could be the problem here?
Am 24.05.2008 um 22:23 schrieb Lutz Jänicke:
I
Till Elsner wrote:
>
> Am 26.05.2008 um 13:13 schrieb Lutz Jaenicke:
>
>> Till Elsner wrote:
>>> Ok, after verifying what platform I'm actually compiling for, it's
>>> definitely little-endian (Linksys WRT54G running on Broadcom BCM4712).
>>> So what else could be the problem here?
>>>
>>> Am 24.05
Till Elsner wrote:
> Ok, after verifying what platform I'm actually compiling for, it's
> definitely little-endian (Linksys WRT54G running on Broadcom BCM4712).
> So what else could be the problem here?
>
> Am 24.05.2008 um 22:23 schrieb Lutz Jänicke:
>> I am not aware of any specific problems of O
Kyle Hamilton wrote:
This is correct. There is also an additional mitigating factor: the
private key files themselves (either in plaintext or ciphertext) are
never seen by any attacker. The keys generated by the vulnerable
versions of Debian are vulnerable simply because they have low
entropy,
Thomas Mangold wrote:
Why not just copy the key?
EVP_PKEY *cp_key (EVP_PKEY *pkey) {
/* error handling omittet */
EVP_PKEY *pnew;
int key_type;
pnew = EVP_PKEY_new();
switch(pkey->type) {
case EVP_PKEY_RSA:
DSA *dsa = EVP_PKEY_get1_DSA(pkey);
EVP_PKEY_s
Ok, after verifying what platform I'm actually compiling for, it's
definitely little-endian (Linksys WRT54G running on Broadcom BCM4712).
So what else could be the problem here?
Am 24.05.2008 um 22:23 schrieb Lutz Jänicke:
Till Elsner schrieb:
Hi,
I'm running a program using some OpenSSL
10 matches
Mail list logo