Sindya,
Looking at the hexdump issue earlier in the thread, I have a question for
you. Is your memory buffer block or word aligned? Some mismatch here may
cause some block computation issues.
- Steve
> Steve,
>
> I am also facing a similar issue. In my case the key generated by
> DH_compute_ke
Steve,
I am also facing a similar issue. In my case the key generated by
DH_compute_key need to be used by hash function for authentication purpose.
Even after prepending the key with zeros, hash'd value is not same as the
other end.
Is there any built-in or openSSL function that will prepend th
I am facing the same issue and getting same error on FreeBED 9.1 as below.
FIPS routines:FIPS_check_incore_fingerprint:fingerprint does not
match:fips.c:232:
Only thing different is I am using openssl-fips-2.0.5. Did anyone get
solution for this problem?
--Girish
--
View this message in co
Hello list,
given that I know in advance the remote end's RSA public key, and that the
remote end is responding to my TLS handshake with a self-signed
certificate signed by his private RSA key, then what is the proper way of
verifying that nobody has tampered with the connection?
What I am c
> From: Viktor Dukhovni
>
> You can test with s_client(1) and compare results. Is your client
> certificate an
> RSA certificate? How many bits of public key? Is its signature SHA1 or
> SHA256?
It's a 2048 bit RSA SHA1 certificate, but I think Dave Thompson's right and
it's not getting that f
On Fri, Nov 08, 2013 at 01:37:21PM +0200, Serhat Sevki Dincer wrote:
> what's the correct commandline?
You can alternatively generate ec keys with ecparam(1):
$ umask 077
$ openssl ecparam -genkey -name prime256v1 |
openssl pkey -aes128 -out priv.pem
--
Viktor.
Hello,
I am currently trying to fix some memory leaks I introduced into my
application, and am left with some leaks (according to valgrind) that
seem to relate to RSA_public_encrypt. However, I cannot detect any
problem with not freeing memory I explicitly allocated.
Hence the question: Do I miss
On Fri, Nov 08, 2013 at 01:37:21PM +0200, Serhat Sevki Dincer wrote:
> On windows 7 with OpenSSL 1.0.1e, I get the following output:
>
> $ openssl.exe genpkey -out priv.pem -aes128 -algorithm EC -pkeyopt
> ec_paramgen_curve:secp224r1
>
> parameter setting error 3512:error:06089094:digital envel
On Fri, Nov 08, 2013, Serhat Sevki Dincer wrote:
> Hi,
> On windows 7 with OpenSSL 1.0.1e, I get the following output:
>
> $ openssl.exe genpkey -out priv.pem -aes128 -algorithm EC -pkeyopt
> ec_paramgen_curve:secp224r1
>
> parameter setting error 3512:error:06089094:digital envelope
> routines:
Hi,
On windows 7 with OpenSSL 1.0.1e, I get the following output:
$ openssl.exe genpkey -out priv.pem -aes128 -algorithm EC -pkeyopt
ec_paramgen_curve:secp224r1
parameter setting error 3512:error:06089094:digital envelope
routines:EVP_PKEY_CTX_ctrl:invalid operation:.\crypto\evp\pmeth_lib.c:404
10 matches
Mail list logo