Dear Dave,
I really appreciate your detailed test and explanation. Now, I get your
point. The "optimized out" means the code can not be executed in the
execution. I guess the optimization reason lies in that those signed data
are not be actually sent. I will review my code and the whole logic of m
> From: owner-openssl-us...@openssl.org On Behalf Of ??
> Sent: Friday, 02 July, 2010 00:10
> Thank you for your detailed explanation. However, I still confused
with
> those "optimized" line, which also occurs in the verification process.
> Here is the code to get a public key
I have written a FIPS-1.1.2 compliant (OpenSSL 0.9.7m) application that
validates certificates that are read in from files. It also loads the
CA certificates and corresponding CRLs from files. I am trying to
determine any limitations with loading large CRLs (~200-250 MB) and to
characterize the r
To start off with, we're sorry for any confusion we caused, but this
issue does not have any interaction with the heap-walking code. The
problem definitely has to do with the readscreen function. Making
readscreen() a no-op decreases initialization time by 3 seconds.
Delving more into the issue, w
When making a message digest using the EVP_DigestInit_ex,
EVP_DigestUpdate, EVP_DigestFinal_ex functions one ends up with a 20
byte (for instance, with sha1) data structure stored in the md array.
What I would like to know is if the order of those bytes is affected by
underlying architecture of th
Hi, I'm a newbie user of OpenSSL.
I want to create a simple C program that verify a certificate chain like
this:
rootCA->CA-A->client
i found this example on the internet that should work for two consecutive
certificate (but it doesn't work for me); i don't known how to create the
chain...
[code
I just realized that passin works. Should the man page be updated?
Thanks again!
On 7/2/2010 11:22 AM, Jakob Bohm wrote:
On 01-07-2010 14:29, Jon Kristensen wrote:
Looking at the man page for openssl x509* I can't find any password
(passin/passout) arguments. However, when I run the command,
I'm not sure that I follow. I see the passin and passout options on
the genrsa*, req**, and rsa*** command man pages, and I get "unknown
option" for both -passout and -passout for the x509 command.
*) http://www.openssl.org/docs/apps/genrsa.html
**) http://www.openssl.org/docs/apps/req.html
**
Hello all,
I have a C Code which is making use of DES.h in a JNI Environment.
I wanted to know if compiling this code with libcrypto will be enough or it
will need libssl as well?
I am trying to take a DER formatted public key and putting the key
into the Window's Crypt library so that my Windows machine can send my
linux machine encrypted data.
Trying to compile openssl for Windows is not on the table right now.
I am being forced to use the Windows Crypt library.
Dear Jakob,
Thank your for your analysis. I am sorry for only post the part of my code.
Actually, the result from Line 1 to Line 6 is to get the private key and
make the pointer pKey_priv point to the private key. In the following lines
below Line 8, I will use the pKey_priv to sign the data gener
On 02-07-2010 00:12, 翔芦 wrote:
Dear all,
My code segment is to get a private key from a pem file for the data
signing. The code is as the following:
1BIO *priv_pem;
2OpenSSL_add_all_algorithms();
3priv_pem = BIO_new_file("privkey.pem", "rb");
4 pKey_priv = RSA_new();
5 p
On 01-07-2010 14:29, Jon Kristensen wrote:
Looking at the man page for openssl x509* I can't find any password
(passin/passout) arguments. However, when I run the command, I get
prompted for the certificate pass phrase. How am I supposed to provide
the certificate pass phrase?
Its on the man pa
13 matches
Mail list logo