Hi Kopbeen,
I see that linker could not find crypto.dll and lssl.dll.
Are you sure that these libraries were built?
My advise is: Try to build openSSL for Linux using CryptoCOM manual.
You mentioned that you use Mingw32 and Windows.
This manual was written for Linux and there can be some un
Hi All,
My OPENSSL_config(const char *config_name) call was incorrect.
I thought that config_name is the path to configuration file.
But it is config name.
http://www.openssl.org/docs/crypto/OPENSSL_config.html
As usual it is impossible to understand what config_name is it using openssl
document
On Mon, Jun 18, 2012, Nou Dadoun wrote:
> It passes "OK" with the usual verify utility but that's not surprising since
> it passes verification if I'm not using FIPS, I don't imagine there's any
> way to force the verify utility to use the FIPS routines; in any case, I'm
> happy to send them to yo
It passes "OK" with the usual verify utility but that's not surprising since it
passes verification if I'm not using FIPS, I don't imagine there's any way to
force the verify utility to use the FIPS routines; in any case, I'm happy to
send them to you offline ... N
---
Nou Dadoun
ndad...@teradi
On Mon, Jun 18, 2012, Nou Dadoun wrote:
> Sorry accidentally hit send, the oddity is (as I mentioned before) that
> comparable certificates with larger keys using the same signing algorithm
> pass verification. E.g. this one is passing:
>
Can you reproduce this using the "verify" utility and t
Sorry accidentally hit send, the oddity is (as I mentioned before) that
comparable certificates with larger keys using the same signing algorithm pass
verification. E.g. this one is passing:
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 3 (0x3)
Signature Algorith
Here's the certificate which is failing:
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=www.casofti.com, ST=BC,
C=CA/emailAddress=dniko...@casofti.com, O=Teradici CA
Validity
N
> From: owner-openssl-us...@openssl.org On Behalf Of Francis GASCHET
> Sent: Monday, 18 June, 2012 12:06
> In my application, I met some problem when verifying a
> certificate which is expired. It worked perfectly in 0.9.8
> and I get the X509_V_ERR_CERT_HAS_EXPIRED error code,
> The same code
Hi all,
This is my first question to the openssl community - apologies if its a bit
noobish.. but I am really stuck..
I am trying to build the Russian Gost engine on windows using openssl-0.9.8e
if you look at a translated version of link:
http://www.cryptocom.ru/opensource/openssl098.html
h
I am getting individual messages. Is it possible to subscribe in batch
(diagest) mode?
David
On Mon, Jun 18, 2012, Nou Dadoun wrote:
>
> Why is it failing with the fips library and passing with the non-fips library
> - does it have anything to do with the 1024 bit key? (i.e. 2048 and 4096-key
> certs both work, and the ca cert has a 2048-bit key)
>
Do you get an additional error from
On Mon, Jun 18, 2012, Dirk Menstermann wrote:
> Thanks,
>
> unfortunately I forget to include the information that I need to know it from
> a
> c programm, not from the shell. Do you also know the solution here?
>
At present you have to access the X509 structure directly. For example:
sig_nid
Odd problem, I've been overhauling our x509 certificate handling and I've run
into an issue where the standard openssl x509 verification mechanism fails to
verify a certificate with a 1024-bit key when run with the FIPS version of the
library loaded but which verifies it with the non-FIPS versio
Hello,
In my application, I met some problem when verifying a certificate which
is expired.
It worked perfectly in 0.9.8 and I get the X509_V_ERR_CERT_HAS_EXPIRED
error code, and my verify call back is able to print the issuer and
subject of the "current_cert".
The same code linked with 1.0.
Thanks,
unfortunately I forget to include the information that I need to know it from a
c programm, not from the shell. Do you also know the solution here?
Thanks
__
OpenSSL Project http://www.o
On Mon, 18 Jun 2012 16:08:28 +0200
Dirk Menstermann wrote:
> Would anybody be so kind to explain me how I can read the digest
> algorithm (sha1, sha256, other) from a X509 struct that was used by a
> CA when issuing the certificate (I am using version 0.9.8).
openssl x509 -in [filename of certif
Hello,
Would anybody be so kind to explain me how I can read the digest algorithm
(sha1, sha256, other) from a X509 struct that was used by a CA when issuing the
certificate (I am using version 0.9.8).
Thanks
Dirk
__
OpenSSL Proj
I found the issue in my own code. It has nothing to do with OpenSSL. Sorry.
From: bs...@labtechsoftware.com
To: openssl-users@openssl.org
Date: Fri, 15 Jun 2012 16:47:46 -0400
Subject: DES_ede3_cbc_encrypt Maximum Text Length?
I am interacting with DES encryption at a fairly superfic
Hi,
I need to do RSA encryption/decryption using OAEP according to rfc 3447/PKCS#1
v2.1. The documentation for RSA_public_encrypt states that with the
RSA_PKCS1_OAEP_PADDING padding flag you get 'EME-OAEP as defined in PKCS #1
v2.0 with SHA-1, MGF1 and an empty encoding parameter'. This is wha
Hello to everybody!!
I'm writing a client/server app with communication over SSL. Every setup
can be a server or a client so I think I could benefit from using ocsp
for validation purposes!
I'm very new to openssl but i found that i can use bundled command-line
`ocsp` application for checking cer
20 matches
Mail list logo