* I have seen scripts that have the openssl smime option of -inform, or
-outform set to DEM.
That’s an error. PEM or DER. Interesting mixup. :)
I have seen scripts that have the openssl smime option of -inform, or -outform
set to DEM.
The documentation for these options cite PEM, DER or SMIME as valid values.
Does anyone know where I can find an explanation for DEM?
Is it another type of encoding?
Thank you,
TM
Hello gentlemen,
I am troubleshooting an issue with an AS2 setup, the error I'm getting is
AS1_get_obect:header too long:asn1. Playing with another system, I was able
to replicate the issue by switching the encoding from Base64 to Binary.
Before i get a smart response... the trading partner can't
can get a
detailed documentation of the flags. Below I paste my code and a stack overflow
question I had asked. Thanks for your time.
openssl smime -sign -signer *certificate.cer* -inkey *myKey*
-outoutFile.xml.cms -in *infile.xml -outform PEM -nodetach
I do try to do this in Objective-C, but
can get a
detailed documentation of the flags. Below I paste my code and a stack overflow
question I had asked. Thanks for your time.
openssl smime -sign -signer *certificate.cer* -inkey *myKey*
-outoutFile.xml.cms -in *infile.xml -outform PEM -nodetach
I do try to do this in Objective-C, but
get openssl to decrypt this using the openssl
smime command? i.e. override the cipher used so that is uses
aes-192-cbc ?
Not using the smime command no. There are ways to handle this either with a
short program or by using a binary cut+paste using asn1parse.
Another alternative is to use a
y to get openssl to decrypt this using the openssl
> smime command? i.e. override the cipher used so that is uses
> aes-192-cbc ?
Not using the smime command no. There are ways to handle this either with a
short program or by using a binary cut+paste using asn1parse.
Another alternative is to
Hi,
I need to decrypt some S/MIME content with an invalid key length for
the AlgOID specified in the PCKS7 content.
AES-256 is specified as the AlgOID, but a key length of 192 bits is
being used.
Is there anyway to get openssl to decrypt this using the openssl smime
command? i.e
Just an update..
Looks like -nodetach option is doing the trick..phew..
S
--
View this message in context:
http://openssl.6102.n7.nabble.com/openssl-smime-sign-issue-tp48444p48472.html
Sent from the OpenSSL - User mailing list archive at Nabble.com
Hello,
If I run openssl -verify command it is successful but if I send the output
to /usr/sbin/sendmail to mail me, the outlook says invalid signature..
I am verifying like this:
openssl smime -sign -signer
/home/howler/processEmail/signedCert/email_sign_cert_prod.pem -inkey
/home/howler
Hello,
I am sending sign email using command line. Email is sent properly however,
on the receiving end, mail client states that signature is not valid and I
need help debugging this issue.
this is the command I use
openssl smime -sign -signer /cert.pem -keyin /cert.p8 -passin
pass:secret -in
enssl-us...@openssl.org] On Behalf Of Dave Thompson
> > Sent: Freitag, 22. November 2013 22:42
> > To: openssl-users@openssl.org
> > Subject: RE: Malloc failure when decrypting files larger 1.48 GB with
> > openssl smime
> >
> > openssl uses a mostly generic schem
ssl.org] On Behalf Of Dave Thompson
> Sent: Freitag, 22. November 2013 22:42
> To: openssl-users@openssl.org
> Subject: RE: Malloc failure when decrypting files larger 1.48 GB with
> openssl smime
>
> openssl uses a mostly generic scheme to deal with numerous objects
> that are e
l.org
Subject: RE: Malloc failure when decrypting files larger 1.48 GB with openssl
smime
openssl uses a mostly generic scheme to deal with numerous objects
that are encoded in 'DER', the most common representation of ASN.1,
including X.509 certificates and CSRs for them, and CRL
...@openssl.org] On Behalf Of Marco Köllner
Sent: Friday, November 22, 2013 03:02
To: openssl-users@openssl.org
Subject: *** Spam *** RE: Malloc failure when decrypting files larger 1.48
GB with openssl smime
Hi Dave,
Thank you for this description. It helps me to understand whats happen.
So Ill
ting files larger 1.48 GB with openssl
smime
There's a hardcoded limit of just under 1.5G (0x5ffc) on growing
BUF_MEM, which is used to hold 'streamed' input DER in this case
and others (but no other openssl ASN.1 data would be this big).
Apparently this is to allow the data to
013 05:14
To: <mailto:openssl-users@openssl.org> openssl-users@openssl.org
Subject: *** Spam *** Malloc failure when decrypting files larger 1.48 GB
with openssl smime
Hi,
For one of our customer Im trying to test RSA public key encryption for
file transfer.
The common setup is windos7 &
Hi,
For one of our customer I'm trying to test RSA public key encryption for file
transfer.
The common setup is windos7 & 8 as 64bit system & OpenSSL 0.9.8k (but 0.9.8y &
1.0.1e shows the same problem).
Now I see a problem by decrypting large files with OpenSSL.
Main
On Thu, Oct 10, 2013, Puneet Khunteta wrote:
> Can i get the patch file( diff) for "Streaming ASN1 encode support for
> PKCS#7 and CMS." feature introduced in v1.0.0 ?
>
It's not a trivial change. A significant amount of the ASN1, BIO and PKCS#7
code was modified to support streaming.
Steve.
--
<mailto:khunteta.puneet@gmail.**com>>
>> wrote:
>>
>> Hello Guys,
>>
>> I am a newbie to this forum though I worked with the openssl code
>> little while.
>>
>> I have faced an issue while performing encryption on a HPUX target
>>
UX target
machine to get a pkcs7 format output.
I was trying the following command to perform the encryption using
s/mime utility :
openssl > smime -encrypt -binary -in "XYZ.eml" -out "XYZ-Enc.eml"
-aes256 "Encrypt.cer"
where
Encrypt.cer is
d an issue while performing encryption on a HPUX target machine
> to get a pkcs7 format output.
> I was trying the following command to perform the encryption using s/mime
> utility :
> openssl > smime -encrypt -binary -in "XYZ.eml" -out "XYZ-Enc.eml" -aes256
> "
Hello Guys,
I am a newbie to this forum though I worked with the openssl code little
while.
I have faced an issue while performing encryption on a HPUX target machine
to get a pkcs7 format output.
I was trying the following command to perform the encryption using s/mime
utility :
openssl > sm
Hi Walter,
thank you very much for your answer.
I finally found the solution yesterday, but I did not know how to
"close" this issue I submitted.
I explain my solution just to check if is seems Ok to you :
- I changed the openssl smime command to remove all header part
- I insert
> My config is :
>
> OS : centos 6
> OpenSSL : openssl-1.0.0-20.el6_2.5.x86_64
>
> My commands are :
>
> oppenssl smime -sign -in myfile -signer mycertif.pem -inkey mykey.pem |
> openssl smime -out signedfile -from m...@me.me -to t...@to.to -subject
> mysubject -
Hi,
I used to send openssl SMIME with no problem.
I needed to add a header : Disposition-Notification-To : [email adress]
But I could not figure out how to send it correctly.
If I use sendmail, it removes the header Disposition-Notification-To,
and when I tried other mailer (Mutt) it adds the
Hello, experts!
A have a task to verify cms message with openssl command line, the operation
is:
*openssl smime -verify -in [fileName] -inform der -noverify -out
[outputFileName]*
(noverify argument is because i have a problem with root cert and now i need
to solve first problem - verify digital
On Tue, Aug 28, 2012, GWu wrote:
>
> Great, thanks a lot. I've been able to reproduce this on the erroneous
> messages as well, and a correctly signed message gives for example
>
> openssl rsautl -verify -certin -inkey s.pem -in sig.der -asn1parse
> 0:d=0 hl=2 l= 33 cons: SEQUENCE
> 2:
On Tue, Aug 28, 2012 at 1:07 PM, Dr. Stephen Henson wrote:
>
> - ba 80 69 57 62 78 03 d4-57 3c 93 83 b9 86 f1 5a ..iWbx..W<.Z
> 0010 - 35 23 58 3d
>
> This isn't a proper DigestInfo structure at all it's just presumably the raw
> SHA1 hash (as you can see from its length: 20 bytes). A pr
side of messageDigest is not encoded
> properly?
>
> Thanks for any advice and please excuse my beginner's questions, I'm
> trying to get a grip on these things ...
Firsty you need to extract the signer certificate. You can use the smime
utility for this by turning off all ver
On Mon, Aug 27, 2012 at 10:50 PM, Dr. Stephen Henson wrote:
> On Mon, Aug 27, 2012, GWu wrote:
>> The email is available at
>> http://www.buergerkarte.at/mvnforum/mvnforum/viewthread_thread,272#1180
>> (German language forum, but the email - or it's significant parts
>> respectively - is easily vis
On Mon, Aug 27, 2012, GWu wrote:
> On Mon, Aug 27, 2012 at 9:27 PM, Dr. Stephen Henson wrote:
> > On Mon, Aug 27, 2012, GWu wrote:
> >> [...]
> >> openssl smime -inform SMIME -CAfile all.pem -verify -in mail.eml
> >> which gives an error:
> >>
On Mon, Aug 27, 2012 at 9:27 PM, Dr. Stephen Henson wrote:
> On Mon, Aug 27, 2012, GWu wrote:
>> [...]
>> openssl smime -inform SMIME -CAfile all.pem -verify -in mail.eml
>> which gives an error:
>> [...]
>
> It sounds like the signature is malformed. That wouldn&
On Mon, Aug 27, 2012, GWu wrote:
> Hello,
>
> I'm trying to verify an email signature using openssl.
>
> I've saved the complete mail to a file named mail.eml, then I'm using
> openssl to verify:
>
> openssl smime -inform SMIME -CAfile all.pem -verify
Hello,
I'm trying to verify an email signature using openssl.
I've saved the complete mail to a file named mail.eml, then I'm using
openssl to verify:
openssl smime -inform SMIME -CAfile all.pem -verify -in mail.eml
which gives an error:
2674688:error:0D0680A
enssl. The command in openssl is:
>openssl smime -binary -sign -passin "pass:MyPassword" -signer cert.pem
>-inkey key.pem -in DocumentToSign.txt -out SignedDocument.der -outform DER
>What I have now in Java produces a PEM formatted s/mime file.
I very much doubt it's
I've created a prototype, in Java that creates an s/mime file, and now I need
to convert that to the equivalent of what the "binary" switch does when using
openssl. The command in openssl is:
openssl smime -binary -sign -passin "pass:MyPassword" -signer cer
Hi All,
Does openssl smime CLI supports encryption using password, instead of using
recepient certificate?
Thanks,
Erwin
rm DER -in
sigblob.der.
However for some strange reason, openssl smime -verify keeps
reporting "digest_failure". I have tried all of the following
commands:
openssl smime -verify -inform DER -in sig.tmp -binary -content data.tmp
-noverify -out /dev/null
openssl smime -verify -in
On Mon, Jul 11, 2011, Dr. Stephen Henson wrote:
> On Mon, Jul 11, 2011, Michael Tabolsky wrote:
>
> > On Monday 11 July 2011 01:18:22 Dr. Stephen Henson wrote:
> > > Is that big file base64 encoded? If so then the decode process can
> > > increase
> > > the memory considerably. I'd suggest you b
On Mon, Jul 11, 2011, Michael Tabolsky wrote:
> On Monday 11 July 2011 01:18:22 Dr. Stephen Henson wrote:
> > Is that big file base64 encoded? If so then the decode process can increase
> > the memory considerably. I'd suggest you base64 decode it and then try the
> > -inform DER option to the smi
On Monday 11 July 2011 01:18:22 Dr. Stephen Henson wrote:
> Is that big file base64 encoded? If so then the decode process can increase
> the memory considerably. I'd suggest you base64 decode it and then try the
> -inform DER option to the smime -decrypt command. It will still need the
> lot in me
On Mon, Jul 11, 2011, Michael Tabolsky wrote:
> Dear OpenSSL Community,
>
> I am struggling for four days trying to workaround the problem...
>
> I have a big smime encrypted file, approximately 5GB which was encrypted
> using openssl:
>
> openssl smime -encry
Dear OpenSSL Community,
I am struggling for four days trying to workaround the problem...
I have a big smime encrypted file, approximately 5GB which was encrypted using
openssl:
openssl smime -encrypt -stream -des3 -binary cert.crt -in data.file -out
data.file.enc
The file is a bziped
Is openssl cms the now recommended way to handle data which used to be
handled using openssl smime?
I keep some files encrypted on disk using the smime utility, but if cms
is recommended I will start using that.
--
Leonard F. Elia III, CISSP
Sr. System Administrator
LITES - NASA Langley
ird file
is "certificate".
When I've got one .pdf file it's simple:
-> /usr/bin/uuencode -m file.pdf file.pdf > codefile.code
-> drop the first raw from the "codefile.code" file
-> openssl smime -sign -text -binary -in codefile.code -out smime.p7s
-signer
On Thu, Jul 09, 2009, tlhackque wrote:
>
> openssl smime -verify doesn't validate that the From field's email address
> matches the email address in the signer's certificate.
>
> It should. In fact, per RFC 2312 section 3.1, it MUST: "Receiving agents
> M
openssl smime -verify doesn't validate that the From field's email address
matches the email address in the signer's certificate.
It should. In fact, per RFC 2312 section 3.1, it MUST:
"Receiving agents MUST check that the address in the From header of a mail
message matc
Hi!
Please correct me if I'm wrong, but afaik the "-stream" option doesn't
work for the openssl smime commands "decrypt" and "verify" (tested
with openssl-1.0.0-stable-SNAP-20090511, openssl-SNAP-20090511 and
openssl-1.0.0-beta2).
Regards,
Ha
On Fri, May 08, 2009, kha...@sbi-secureit.com wrote:
> face="Verdana,sans-serif">Hi All, style="font-family: "Verdana","sans-serif";" size="2"
> color="black" face="Verdana,sans-serif">I
> am having a problem with decrypting large file with openssl 4.5GB.
> openssl does not recognize -stream
Hi All, I
am having a problem with decrypting large file with openssl 4.5GB.
openssl does not recognize -stream as an smime option in the first
place even though I upgraded to the latest version. I was wondering if you
can help me in this issue.Many thanks
___
Kyle Hamilton wrote:
S/MIME requires that all native line endings be converted to \r\n
before signing.
My understanding is that s/mime is only focused on email related, so I
think it's ok using \r\n replace \r.
thanks,
-Derek
S/MIME requires that all native line endings be converted to \r\n
before signing.
-Kyle H
On Mon, Apr 13, 2009 at 8:32 PM, xh wrote:
> Hi everyone,
>
> I find the output of the openssl smime -decrypt is not the same with the
> original one.
> My OS is Fedora 10 and the openssl ve
Hi everyone,
I find the output of the openssl smime -decrypt is not the same with the
original one.
My OS is Fedora 10 and the openssl version is 0.9.8g.
I use the following command to get the encrypt version of the file a.txt
# openssl smime -encrypt -in a.txt -out b.txt mycert.pem
and try
lto:owner-openssl-us...@openssl.org]
On Behalf Of Paul Allen
Sent: Tuesday, March 31, 2009 7:38 PM
To: openssl-users@openssl.org
Subject: Re: "openssl smime ... [-md digest] ..." seems to be unknown option
ontle last version openssl
On Tue, 2009-03-31 at 08:50 -0700, Beneš Vladimír wrote:
> H
lto:owner-openssl-us...@openssl.org]
On Behalf Of Paul Allen
Sent: Tuesday, March 31, 2009 7:38 PM
To: openssl-users@openssl.org
Subject: Re: "openssl smime ... [-md digest] ..." seems to be unknown option
ontle last version openssl
On Tue, 2009-03-31 at 08:50 -0700, Beneš Vladimír wrote:
> Hi
On Tue, Mar 31, 2009, Bene? Vladimr wrote:
> Hi,
>
> there is mentioned command option "-md" on official documentation -
> http://www.openssl.org/docs/apps/smime.html#
> """
> SYNOPSIS
> openssl smime ... [-md digest] ...
> ...
> COMM
On Tue, 2009-03-31 at 08:50 -0700, Beneš Vladimír wrote:
> Hi,
>
> there is mentioned command option "-md" on official documentation -
> http://www.openssl.org/docs/apps/smime.html#
> """
> SYNOPSIS
> openssl smime ... [-md digest] ...
>
Hi,
there is mentioned command option "-md" on official documentation -
http://www.openssl.org/docs/apps/smime.html#
"""
SYNOPSIS
openssl smime ... [-md digest] ...
...
COMMAND OPTIONS
...
-md digest
digest algorithm to use when signing or resigning. If not
; like it was a S/MIME message, such that
> I could use "openssl smime" to be able to decrypt the signature string so
> that I could compare it to the has (which, as I said, I have).
>
> In other words, I was thinking something along the lines of take the
> signature
e it was a S/MIME message, such that I
could use "openssl smime" to be able to decrypt the signature string so that I
could compare it to the has (which, as I said, I have).
In other words, I was thinking something along the lines of take the signature
string, paste it into a file that
at 4:28 PM, wrote:
> Hi,
>
> I have the signature string from a signed SAML assertion. I also have the
> private key file and cert file. I'm trying to decrypt the signature string,
> so that I can try to see how it compares to the digest in the assertion.
>
> I think th
Hi,
I have the signature string from a signed SAML assertion. I also have the
private key file and cert file. I'm trying to decrypt the signature string, so
that I can try to see how it compares to the digest in the assertion.
I think that "openssl smime" should be able to
On Thu, May 15, 2008, Fedak, Joe wrote:
> I am using the OpenSSL SMIME command to sign files with -outform DER and
> -nodetach. However, for files larger than 1MBytes, the output file does
> not contain all the data. Does anyone know how I can sign large files?
> Need signed data in
I am using the OpenSSL SMIME command to sign files with -outform DER and
-nodetach. However, for files larger than 1MBytes, the output file does
not contain all the data. Does anyone know how I can sign large files?
Need signed data in ASN.1 format.
Thanks
Joe Fedak
Ok thanks for the information Stephen.
On Jan 16, 2008 3:14 PM, Dr. Stephen Henson <[EMAIL PROTECTED]> wrote:
> On Wed, Jan 16, 2008, Fabien Penso wrote:
>
> > > What key size are you using? If it is something large like 8192 bits it
> > > will
> > > take longer. You also have the overhead of run
On Wed, Jan 16, 2008, Fabien Penso wrote:
> > What key size are you using? If it is something large like 8192 bits it will
> > take longer. You also have the overhead of running the openssl command each
> > time.
>
> standard "RSA Public Key: (4096 bit)", nothing fancy. I feel like 17
> seconds p
> What key size are you using? If it is something large like 8192 bits it will
> take longer. You also have the overhead of running the openssl command each
> time.
standard "RSA Public Key: (4096 bit)", nothing fancy. I feel like 17
seconds per 100 mails is slow. I was hoping I would find a way t
On Wed, Jan 16, 2008, Fabien Penso wrote:
> Hi,
>
> I was wondering if the performance I had for signing emails was
> normal, and how I could improve it. I have the following :
>
> time for i in `seq 0 100`; do openssl -sign -passin pass:something -in
> /tmp/foobar -text -out /tmp/foobar.signed
Hi,
I was wondering if the performance I had for signing emails was
normal, and how I could improve it. I have the following :
time for i in `seq 0 100`; do openssl -sign -passin pass:something -in
/tmp/foobar -text -out /tmp/foobar.signed -signer vserver.crt -inkey
server.key ; done
that takes
hen signing a little file (in
this case: a null byte file), the following command writes a null
byte file as output:
openssl smime -sign -in /tmp/nullfile -out /tmp/signed_nullfile -
signer /tmp/my_private_key -nodetach -binary -outform DER -stream
When not using the option "-stream"
tely satisfied :-)
It seems I've found a problem in the "-stream" functionality of the
command line openssl tool in 0.9.9. When signing a little file (in
this case: a null byte file), the following command writes a null
byte file as output:
openssl smime -sign -in /tmp/nullf
Hi All!
I'm looking for the sample how I can bind two applications. First uses "openssl
smime -sign -binary -signer -inkey -outform DER
-nodetach -noattr -nocerts" commant to sign message (it written in PHP and
already works). Second written in Java. I'm developing th
Hello!
Am 14.04.2007 um 00:04 schrieb Dr. Stephen Henson:
Sorry to have given you false hopes. The issue that all the data
has to
be in working memory to be encrypted is indeed starting to become
a real
annoyance in some practical circumstances. So perhaps if Stephen
Henson
should develop
Hello,
Am 14.04.2007 um 00:04 schrieb Dr. Stephen Henson:
'tis done.
I found a quiet period to look into it and test it a little. Check
out the new
-stream option in the smime utility for OpenSSL 0.9.9.
Support in the API is quite simple too, just include the
PKCS7_STREAM flag in
the call
Hello,
Am 14.04.2007 um 00:04 schrieb Dr. Stephen Henson:
Sorry to have given you false hopes. The issue that all the data
has to
be in working memory to be encrypted is indeed starting to become
a real
annoyance in some practical circumstances. So perhaps if Stephen
Henson
should develop
On Sat, Mar 24, 2007, Marco Roeland wrote:
> On Saturday March 24th 2007 at 12:58 Harald Latzko wrote:
>
> > I compiled the 0.9.9 snapshot, resulting in a binary that has the
> > same behaviour (growing in RAM very much). Do you know how to enable
> > this experimental code and if this featur
Hello,
Am 24.03.2007 um 14:39 schrieb Dr. Stephen Henson:
No, sorry I do not know how to enable the streaming encryption
support
and it very probably will not be in the command line tool.
I only know beginnings of streaming encryption support exist from
posts
by Dr. Stephen Henson on this
On Sat, Mar 24, 2007, Marco Roeland wrote:
> On Saturday March 24th 2007 at 12:58 Harald Latzko wrote:
>
> > I compiled the 0.9.9 snapshot, resulting in a binary that has the
> > same behaviour (growing in RAM very much). Do you know how to enable
> > this experimental code and if this featur
On Saturday March 24th 2007 at 12:58 Harald Latzko wrote:
> I compiled the 0.9.9 snapshot, resulting in a binary that has the
> same behaviour (growing in RAM very much). Do you know how to enable
> this experimental code and if this feature is included in the openssl
> command line tool?
N
Hello!
Am 23.03.2007 um 20:01 schrieb Marco Roeland:
can anybody even confirm that encrypting files via "openssl smime"
command consumes very much memory?
Yes. The PKCS7_encrypt(3ssl) function needs to hold all the data in
memory as specified in the BUGS section of its man page. A
On Friday March 23rd 2007 at 18:55 Harald Latzko wrote:
> can anybody even confirm that encrypting files via "openssl smime"
> command consumes very much memory?
Yes. The PKCS7_encrypt(3ssl) function needs to hold all the data in
memory as specified in the BUGS section of its
Hello again,
can anybody even confirm that encrypting files via "openssl smime"
command consumes very much memory?
Regards,
Harald
Am 22.03.2007 um 19:29 schrieb Harald Latzko:
Hi!
I encrypt files via openssl on commandline using the following
command:
openssl smime -encryp
Hi!
I encrypt files via openssl on commandline using the following command:
openssl smime -encrypt -in /tmp/testfile -out /tmp/testfile.enc -
nodetach -binary -aes256 -outform DER -engine padlock /tmp/public.pem
Since I use the engine "padlock" on a VIA CPU (openssl speed show an
On Fri, Jul 29, 2005, Steven Bade wrote:
>
> Steven Bade wrote:
>
> | Is there a method/means to use the S/MIME function to encrypt a file,
> | but leave the content in a binary format, rather than conversion to
> | base64 etc??
> |
> | Basically provide similar function to GnuPG but using X.509
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Steven Bade wrote:
| Is there a method/means to use the S/MIME function to encrypt a file,
| but leave the content in a binary format, rather than conversion to
| base64 etc??
|
| Basically provide similar function to GnuPG but using X.509 certificat
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Is there a method/means to use the S/MIME function to encrypt a file,
but leave the content in a binary format, rather than conversion to
base64 etc??
Basically provide similar function to GnuPG but using X.509 certificates
, and the PKCS#X standards
--- Eddy Tan <[EMAIL PROTECTED]> wrote:
>
> I´ve tried to check if my openssl is running the correct libraries
> and it looks like everything the same as yours, but the problem still
> occurs. Pls look below...
Don´t worry about it... upon re-checking all libraries one by one I
found that it runs
Hi,
I´ve tried to check if my openssl is running the correct libraries and
it looks like everything the same as yours, but the problem still
occurs. Pls look below...
> Try running 'type' openssl to determine where your exact application
> lives:
# type openssl
openssl is hashed (/usr/bin/openss
result of the decrypt that is obviously corrupted.
> The verify fails.
>
> I also tried it without the "-binary" on the sign.
>
> C:\>openssl rand -rand rand.dat -base64 128 1>rand2.dat
> Loading 'screen' into random state - done
> 4899 semi-r
64 128 1>rand2.dat
> Loading 'screen' into random state - done
> 4899 semi-random bytes loaded
>
> C:\>openssl smime -sign -in a.txt -signer fac_sign2.pem -out temp_se.smime
> -passin pass:Pass-123 -nocerts -binary
> Loading 'screen' into random stat
of the decrypt that is obviously corrupted.
> The verify fails.
>
> I also tried it without the "-binary" on the sign.
>
> C:\>openssl rand -rand rand.dat -base64 128 1>rand2.dat
> Loading 'screen' into random state - done
> 4899 semi-random bytes loa
e sign.
C:\>openssl rand -rand rand.dat -base64 128 1>rand2.dat
Loading 'screen' into random state - done
4899 semi-random bytes loaded
C:\>openssl smime -sign -in a.txt -signer fac_sign2.pem -out temp_se.smime
-passin pass:Pass-123 -nocerts -binary
Loading 'screen'
On Wednesday May 18th 2005 Eddy Tan wrote:
> Is it a bug on the kernel or openssl?
>
> $ openssl smime -encrypt -in in.txt -out out.enc cert.pem
> Segmentation fault
At any rate this is an application bug, not a kernel bug.
> I?m running debian linux (kernel 2.6.8-2-386) with
Is it a bug on the kernel or openssl?
$ openssl smime -encrypt -in in.txt -out out.enc cert.pem
Segmentation fault
I´m running debian linux (kernel 2.6.8-2-386) with openssl 0.9.7e-3
(tried to upgrade openssl to 0.9.7g-1 did not help).
the same command (same version of openssl) but on
Hi,
I am new to openssl but not to PKI.
I want to send encrypted & signed smime encodings but not using an email client
or server. I want to send multiple file attachments per encoding but openssl
appears to only want to do one message-body per encoding.
1. Can I use "openssl smim
to pipe openssl to sendmail with a normal
message body:
openssl smime [...] | sendmail [EMAIL PROTECTED]
But what if I need to send the email with a secure attachment
too?
Thanks in advance,
Eddy
__
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the
Hi all,
anyone knows how to send s/mime with file attachment?
It´s pretty simple to pipe openssl to sendmail with a normal
message body:
openssl smime [...] | sendmail [EMAIL PROTECTED]
But what if I need to send the email with a secure attachment
too?
Thanks in advance,
Eddy
esday, March 30, 2005 5:26 AM
To: openssl-users@openssl.org
Subject: Re: openssl smime ability to create a multi-attachment message?
On Tue, Mar 29, 2005, Chevalier, Victor T. wrote:
> I am using mpack to create the mime message, it looks like openssl is
> putting S/MIME around the entire M
On Tue, Mar 29, 2005, Chevalier, Victor T. wrote:
> I am using mpack to create the mime message, it looks like openssl is
> putting S/MIME around the entire MIME message as if it were text...used
> this command:
> openssl smime -sign -inkey private/mykey.pem -signer mycert.pem -in
&
1 - 100 of 140 matches
Mail list logo