Hello,
newbie question regarding the Blowfish algorithm: why do my
encrypt/decypt functions fail on Windows XP SP3 with OpenSSL 1.0.0e?
The same functions work on my Linux workstation.
Windows output:
Encrypt:
encrypting 7680 bytes
EVP_DecryptUpdate 1024 bytes
EVP_DecryptFinal 8 byte
> From: owner-openssl-us...@openssl.org On Behalf Of Craig
> Sent: Monday, 21 November, 2011 11:56
> I'm fairly new to C/C++ so please bear with me.
Warning: beware of people who tell you C++ is a superset of C.
It's not. C++, deliberately, includes MOST of C -- maybe
80-90%, d
> From: owner-openssl-us...@openssl.org On Behalf Of Aravind GJ
> Sent: Tuesday, 22 November, 2011 23:32
> I use BIO_new_mem_buf and PEM_read_bio_X509 to convert
> the certificate in memory buffer to X509 certificate format.
> Finally the certificate is then added to the CA sto
Hello,
I am using EVP to encrypt and decrypt some files. This works pretty
well. But now I restructured my code in order to be able to decrypt data
streams so I don't have to save an unencrypted version of a file on the
hd before computing it. To do that I initialize the cipher context
before t
Thanks for the document. This document tells me about the ldif file
but its not saying anything about
the schema. I need step by step procedure.
please help
On Mon, Nov 21, 2011 at 9:51 PM, Erwin Himawan wrote:
> Although, this doc is outdated, I find that this doc is
> helpful: http://vandervl
Ok, found the answer shortly after posting my message to the list. Here's the
answer for the archive:
> -Original Message-
> From: Eisenacher, Patrick
>
> I'm using asn1parse -genconf to der encode the following asn1
> structure:
>
> URLs ::= SEQUENCE OF {
> url0 [0] EXPLICIT General
Hi guys,
I'm using asn1parse -genconf to der encode the following asn1 structure:
URLs ::= SEQUENCE OF {
url0 [0] EXPLICIT GeneralName [6] OPTIONAL,
url1 [1] EXPLICIT GeneralName [6] OPTIONAL,
url2 [2] EXPLICIT GeneralName [6] OPTIONAL
}
but I have a hard time to encode the Genera
If so what are the conditions ?
> Since I wait until the SSL_connect() function succeeds I
> wanted to know if there is a better approach.
Yes, there is a better approach, for example the one mentioned
in the manual:
* http://www.openssl.org/docs/ssl/SSL_connect.html
> If the underlying BIO is non-blocking, SSL_connect() will a