Message-
> From: owner-openssl-us...@openssl.org
> [mailto:owner-openssl-us...@openssl.org] On Behalf Of Carolin Latze
> Sent: Tuesday, September 04, 2012 5:03 AM
> To: openssl-users@openssl.org
> Subject: RE: PEM_read_bio_RSA_PUBKEY
>
> Hi,
>
> I went on reading about this
triggered by the read function
and
> not by any BIO function before that function.
>
> best regards
> Carolin
>
>>> From: owner-openssl-us...@openssl.org On Behalf Of Carolin Latze Sent:
> Monday, 03 September, 2012 13:39
>>> I try to send an RSA p
by any BIO function before that function.
best regards
Carolin
>> From: owner-openssl-us...@openssl.org On Behalf Of Carolin Latze Sent:
Monday, 03 September, 2012 13:39
>
>> I try to send an RSA public from one entity to another using socket
BIOs. I use PEM_write_bio_RSA_PUBKEY and P
Hi all,
I try to send an RSA public from one entity to another using socket
BIOs. I use PEM_write_bio_RSA_PUBKEY and PEM_read_bio_RSA_PUBKEY to do
that. I also tried with PEM_{write|read}_bio_RSAPublicKey. Both have the
same behaviour in my case. The write function seems to work just fine. I
I guess I just got it if the only way is to use the PEM API?
> Hi all,
>
> is there an API call that allows to extract an RSA public key (out of an
> RSA structure) or should I just access rsa->n and rsa->e directly? I
> cannot find an API call RSA_* that gives me the public key, but the
> documen
Hi all,
is there an API call that allows to extract an RSA public key (out of an
RSA structure) or should I just access rsa->n and rsa->e directly? I
cannot find an API call RSA_* that gives me the public key, but the
documentation (http://www.openssl.org/docs/crypto/rsa.html) says one
should not
Hi all
since OpenSSL allows to do the encryption using the BIO API and since I
need the BIO API anyways for the sockets I thought I rewrite my code to
use the BIOs instead of EVPs. However I see some strange behavior. I
create a cipher BIO on the server as follows:
encbio = BIO_new(BIO_f_cipher()
Quick response : Hex value is twice the lengh of binary data :
Have you checked the value of 'size' arg ?
Not sure this helps ...
Le 24/08/2012 16:38, Carolin Latze a écrit :
(sorry if this mail arrives twice. I send it first without being
subscribed to this list by accident)
H
Hi all
I try to implement a DH exchange using socket BIOs. Here is what I do:
On the server
- I initialize a DH structure with DH_new
- I generate the parameters using
DH_generate_parameters(prime_len,g,NULL,NULL) with prime_len=512
- I generate the keys using DH_generate_key(dh)
Now I need t
(sorry if this mail arrives twice. I send it first without being
subscribed to this list by accident)
Hi all
I try to implement a DH exchange using socket BIOs. Here is what I do:
On the server
- I initialize a DH structure with DH_new
- I generate the parameters using
DH_generate_parameters(
that problem??
Regards
Carolin
--
Carolin Latze
Research Assistant
Department of Computer Science
Boulevard de Pérolles 90
CH-1700 Fribourg
phone: +41 26 300 83 30
homepage: http://diuf.unifr.ch/people/latzec
__
Op
Hi everybody,
I try to verify a small X509 chain: ca.pem (self signed) -> client.pem
On the commandline I do: cat ca.pem client.pem >> all.pem and
openssl verify -CAfile ca.pem all.pem (or similar, cannot remember the
exact syntax, but that works like this)
In my little C program, I don't wan
hanks in Advance
Carolin
--
Carolin Latze
Research Assistant
Department of Computer Science
Boulevard de Pérolles 90
CH-1700 Fribourg
phone: +41 26 300 83 30
__
OpenSSL Project http://www.openss
Ok, I found the error: I mixed up data types :-(
Thanks anyway!
Carolin Latze wrote:
> Dr. Stephen Henson wrote:
>
>> On Tue, Apr 29, 2008, Carolin Latze wrote:
>>
>>
>>
>>> Hello everybody,
>>>
>>> I know, that might be an e
Dr. Stephen Henson wrote:
> On Tue, Apr 29, 2008, Carolin Latze wrote:
>
>
>> Hello everybody,
>>
>> I know, that might be an easy question, but I really didn't find an
>> answer till now...
>>
>> I have a certificate in TLS (X.509) with an A
Hello everybody,
I know, that might be an easy question, but I really didn't find an
answer till now...
I have a certificate in TLS (X.509) with an ASN1. Bit String extension.
How to I read it out? Till now I did the following:
X509_EXTENSION *ext;
ext=X509_get_ext(cert,i);
os=X509_EXTENSION_get
cumentation?
>
> Thanks for any help.
> Kind Regards
> Alex
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager [EMAIL PROTECTED]
>
Hi everybody,
I have some problems with X509 extensions. First of all, what I want to do:
I want to define new extensions, simply some new extension fields that I
want to fill with values.
I thought, I just define them in an array:
struct entry ext_entries[3] =
{
{"basicConstraints","CA
18 matches
Mail list logo