On Mon, Dec 20, 2010 at 07:21:54PM -0500, Bhola Ray wrote:
> I have noticed the above flag in our openssl code in several c and h files.
>
> If I use
>
> #define OPENSSL_NO_COMP 1
>
> in the right include file, and build the libcrypto.a and libssl.a
> then in that build
>
Do not do
Hi,
Here are the basic calls needed to generate an ECC key (this example
uses NSA Suite B curve P-256) :
int curveId = OBJ_sn2nid("prime256v1");
EC_GROUP* pGroup = EC_GROUP_new_by_curve_name(curveId);
EC_KEY* pKey = EC_KEY_new();
EC_KEY_set_group(pKey, pGroup);
EC_KEY_generate_key(pKey));
Che
On Mon, Dec 20, 2010, Bhola Ray wrote:
> I have noticed the above flag in our openssl code in several c and h files.
>
> If I use
>
> #define OPENSSL_NO_COMP 1
>
> in the right include file, and build the libcrypto.a and libssl.a
> then in that build
>
> there would be No Compression
I have noticed the above flag in our openssl code in several c and h files.
If I use
#define OPENSSL_NO_COMP 1
in the right include file, and build the libcrypto.a and libssl.a
then in that build
there would be No Compression.
Is it correct, can anyone comment on that...thanks in adv
I just grabbed the openssl-fips-1.2.2 archive from the site and ran
into an error.
System:
> cat /etc/SuSE-release
SUSE Linux Enterprise Desktop 11 (x86_64)
VERSION = 11
PATCHLEVEL = 1
> ./config fipscanisterbuild
> make
gcc -I.. -I../.. -I../../include -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS
-D_R
> From: owner-openssl-us...@openssl.org On Behalf Of Rui Francisco
> Sent: Monday, 20 December, 2010 10:07
(Also on -dev, answering -users only, this is not a -dev question.)
> I'm trying to implement the following code to substitute the
> following
> openssl command
>
> openssl dgst -sha1 -sig
On Mon, Dec 20, 2010 at 10:49:57AM -0800, travis+ml-open...@subspacefield.org
wrote:
> libnss, at least on Linux, checks that the signing cert (chain) is valid
> at the time of signature - as opposed to present time. (It may check
> present time as well - not sure on that)
>
> This makes for pr
So a friend ran into this lately;
libnss, at least on Linux, checks that the signing cert (chain) is valid
at the time of signature - as opposed to present time. (It may check
present time as well - not sure on that)
This makes for problems if you renew the cert, since the new cert will
have a c
I don't think Wireshark will be able to decrypt any packet without the
appropriate keys. I can already capture packets using wireshark or with any
application that uses winpcap, but the problem is decrypting them in order
to see what the application is really talking to the server. And the keys I
On Mon December 20 2010, Yigit wrote:
>
> Hello all,
> I have seen one or two related previous subjects but they didn't solve my
> problem. So I am posting a new one.
>
> There is an application on my computer which connects to a server using
> openssl. I have to see their traffic which means eit
Hi,
I'm trying to implement the following code to substitute the following
openssl command
openssl dgst -sha1 -sign myKey.pem something.txt | openssl enc -base64
I'm using Delphi and the Opensll lib developed by Marco Ferrante
(http://www.disi.unige.it/person/FerranteM/delphiopenssl/)
The
Hello all,
I have seen one or two related previous subjects but they didn't solve my
problem. So I am posting a new one.
There is an application on my computer which connects to a server using
openssl. I have to see their traffic which means either I decrypt all
sniffed packets or I print all dec
12 matches
Mail list logo