Ger Hobbelt wrote:
What may have impact here is that a memory s/s BIO does not act like a
file BIO by default.
To get the same behaviour (at end-of-data == End of File), you should
add the call
BIO_set_mem_eof_return(pio, 0);
after the line
pio = BIO_new(BIO_s_mem())
to ensure y
Good day!
I have problem with reading S/MIME PKCS#7 container from membuf. I've
got "not enough data" error in ASN parsing routine (asn1_d2i_read_bio).
I have sign & crypt zip file (430kb) with S/MIME PKCS#7 within PHP. Then
I wrote a small application to decrypt & verify:
/* Decrypt */
in = B
CAPI uses PVK format for private keys. You can find out more information
here:
http://www.drh-consultancy.demon.co.uk/pvk.html
http://www.drh-consultancy.demon.co.uk/pkcs12faq.html
I modified original pvk program to proper work with CryptImportKey.
http://lrn.ru/~mouse/pvk-0.12-alt.tar.bz2
Run it
I have some trouble with Sign and Enveloped PKCS7. Decrypted file differ
to original.
Below links contain test which shows it up. Unpack and run 'make test'
http://lrn.ru/~mouse/sign_and_enveloped.tar.bz2
My result:
[EMAIL PROTECTED] sign_and_enveloped]$ make test
cc -Wall -O2 -fomit-frame-pointe
I have some trouble with Sign and Enveloped PKCS7. Decrypted file differ
to original.
Attached archive shows it up. Unpack and run 'make test'
My result:
[EMAIL PROTECTED] sign_and_enveloped]$ make test
cc -Wall -O2 -fomit-frame-pointer
-DPACKAGE_BUGREPORT="\"[EMAIL PROTECTED]"" -c decryptverify.