I am trying to help a client convert his SSL certificate to a .p12 format so it
can be installed in a Java keystore on a server running Apache. Based on the
various error messages I am getting, I think that the root certificate needs to
be a part of the conversion command (sample shown below):
Hello,
With regards to CVE-2015-1793, I've seen the example in verify_extra_test.c.
How deep does the certificate chain have to be?
If I have 2 self-signed CA certificates, and a non-CA certificate is
received for verification, will this hit the problem?
Also, is it a condition of the bug that bo
Thank you very much. It really helps.
On Fri, Jul 10, 2015 at 2:32 PM, Matt Caswell wrote:
>
>
> On 10/07/15 13:09, R C Delgado wrote:
> > Hello,
> >
> > With regards to CVE-2015-1793, I've seen the example in
> verify_extra_test.c.
> > How deep does t
Hello,
One further question. Can you please confirm that the alternative
certificate chain feature is enabled by default? It seems to be implied in
all emails regarding this matter, and I'm assuming the Advisory email would
have mentioned it otherwise.
I've searched the OpenSSL code and seen that
Thank you Steve,
This is very useful information.
>>I'm getting private queries about this (why is there is such reluctance
to discuss the delights of FIPS 140-2 in public?).
I've noticed technical questions related to private FIPS certifications
never get answered, at least not on this distribu
Hi,
I did encounter a situation which I think could be better handled by
openssl lib. In my system, when working under heavy load, sometimes while
calling SSL_Write, it will return SSL_ERROR_SYSCALL, which we treated as an
error and aborted the operation. Next time, when we wanted to send a new
p
Hi,
I have two systems one with openssl 1.0.1e (debian wheezy) and the new one
with openssl 1.1.0c (debian stretch)
The files encrypted with 1.0.1e are not decryptable via 1.1.0c
These are the investigations I have done
on my system with 1.0.1e openssl
$ echo some text > file
$ cat file | open
Wow ! thanks
openssl -md md5 ...
does the trick. All my docs are back now.
That was a great help Double thanks to Jeff.
On Sat, Feb 11, 2017 at 7:05 PM, Jeffrey Walton wrote:
> > I have two systems one with openssl 1.0.1e (debian wheezy) and the new
> one
> > with openssl 1.1.0c (debian stret
access the https link.
Regards
Somshekar C Kadam
9036660538
>
trigger seeding of SecureRandom
done seeding SecureRandom
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
%% No cached client session
*** ClientHello, TL
Thanks Viktor for clarification
Regards
Somshekar C Kadam
9036660538
On Wed, Aug 14, 2019 at 9:43 AM Viktor Dukhovni
wrote:
> Java's TLS library is not OpenSSL. This is not the right list
> for help with TLS in JDK8. Speculatively, the timeout might be
> related to IPv6 being
Dr. Stephen Henson wrote:
> On Wed, Jan 31, 2007, Ian Fette wrote:
>
>> Sometimes a SSL_read() operation on toClientSSL will return <0, and
>> SSL_get_error yields SSL_ERROR_SYSCALL, and if I look at errno (from
>> ) it's set to EWOULDBLOCK. I had thought that if something was
>> going to block
Dr. Stephen Henson wrote:
> On Wed, Jan 31, 2007, Ian C. Fette wrote:
>
>> I also tried implementing your reply. Before calling SSL_read() etc I'm
>> now calling ERR_clear_error(). Unfortunately, I still seem to be getting
>> cases where I see SSL_ERROR_SYSCALL and er
Ian C. Fette wrote:
> Dr. Stephen Henson wrote:
>> On Wed, Jan 31, 2007, Ian C. Fette wrote:
>>
>>> I also tried implementing your reply. Before calling SSL_read() etc I'm
>>> now calling ERR_clear_error(). Unfortunately, I still seem to be getting
>>>
Why not encrypt the file using PKCS#7 enveloped or signed and enveloped
data. 3DES-CBC or AES for date encryption, key encryption using intended
recipient public key, authentication using RSA singer public key?
If you need non-expanding data encryption using symmetric cipher, look at
EAS in CTR m
You don't want to specify the CA's private key as the argument for -CAfile,
you need to specify the CA certificate for that.
Also an indication of the errors you get would help ...
D.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Samy Thiyagarajan
Sent
Why would you want the private key to leave the token in clear anyway?
If you need to performs RSA private keyops, then ask the device to
sign/decrypt for you.
The CA3 FWIW will not even let you wrap a private key off under another key
as this HSM is intended for use as a CA's HSM.
If you need t
This may seem a stupid question, but why do you want or need to do this?
You can generate an SS cert with a validity of (say 1 year) and just use it
without needing to generate a new one every time the system starts up. Is
there something special about the environment that I'm not aware of?
D.
Its not the server cert you need in the trusted certs store - it's the CA
root cert.
And you'll need any intermediate CA certs in the regular CA store
D.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Stuart Halliday
Ok, so I put into the Trusted Root
I have just had this problem and am very stuck. I have an xserve which
is colocated, I tried to install another openssl installation and
instead of putting it in /usr/local/lib I put prefix=/usr ...
a!
The web server is working fine, but I cant ssh or ftp or anything into
the machine.
C:\temp>openssl version
OpenSSL 0.9.7d 17 Mar 2004
C:\temp>openssl ca -in mqnode1.crq -out mqnode1.pem
Using configuration from C:\openssl-0.9.7d\apps\openssl.cnf
Loading 'screen' into random state - done
1444:error:0E06D06C:configuration file routines:NCONF_get_string:no
val
C:\temp>openssl version
OpenSSL 0.9.7d 17 Mar 2004
C:\temp>openssl ca -in mqnode2.crq -out mqnode2.pem -days 750
Using configuration from C:\openssl-0.9.7d\apps\openssl.cnf
Loading 'screen' into random state - done
2552:error:0E06D06C:configuration file routines:NCONF_get_string:n
Anyone have any thoughts or an explanation for this???
Dave
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of David C. Partridge
Sent: 17 September 2004 15:15
To: Openssl-Users
Subject: Problem signing certificate OpenSSL 0.9.7d
C:\temp>openssl vers
Not correct.
You sign the message with YOUR private key. The signature is verified by
the recipient using your certificate which is issued by a CA.
If you are also enveloping, then the data is encrypted under a "one-shot"
symmetric key, and this symmteric key is then encrypted using the public
The "one shot" symmetric key is purely random.
No it's not a function of anyone's private or public key.
Once generated, it is encrypted using the public key of the recipient and
included with the message. If multiple recipients, the same key is used to
encrypt the data, and for each recipient i
Not at all, there's no man in the middle issue at all because the
certificates which are issued by a trusted TP g'tee the ownership of the
public key.
The logic goes like this:
You generate a random DES key known only to you. Let's call this KDE
You use this to encrypt the data. Lets call this
Richard Levitte said:
>Note that, as long as you only have applications that really know how
>to handle multiple verification paths, then you can throw all kinds of
>certificates at them without worrying. Unfortunately, that's not a
>reality yet.
Richard, is there any useful guidance you can po
I'm trying to build the html files for the docs from the pod files using
pod2html
The html files are getting built, but the links don't work between them and
I get lots of messages like:
C:\Perl\bin/pod2html.bat:
C:\openssl-0.9.7d\doc\ssl\SSL_CTX_set_ssl_version.pod:
cannot re
We are about to roll-out freeRADIUS servers to 1,700 schools. freeRADIUS and openSSL
will be used for 802.1x security of our wireless networks.
Notebooks that have only one user are working fine - we install a user (username.P12)
and root certificate (root.der) to a notebook running Windows XP
Sounds to me like you're using openssl req rather than openssl ca
Dave
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Michael Weiner
Sent: 24 November 2004 14:12
To: [EMAIL PROTECTED]
Subject: serializing certificates
Is there a way to "force" a serial nu
Sounds like the client doesn't have a key set and certificate, or the
certificate for the CA that issued the client's cert isn't installed at your
web server.
__
OpenSSL Project http://www.openssl.
You can do this in the config file - I'll leave others to tell you how as
I'm a bit rusty on that stuff.
The reason I'm replying is that it is definitely not good form to mark
AlternateName extension as critical. Of course it is valid to do that, but
why should a relying application be FORCED to
Current recommendation is to put in the subjectAltName
extension.
Dave
Is there any expectation that openssl will be enhanced in the near future to
support the current CMS specification which I think is RFC3852? If
possible retaining support for the old PKCS#7 "Signed and Enveloped" message
format?
TIA
Dave
2 CMS specification
On Tue, Apr 26, 2005, David C. Partridge wrote:
> Is there any expectation that openssl will be enhanced in the near future
to
> support the current CMS specification which I think is RFC3852? If
> possible retaining support for the old PKCS#7 "Signed and Enveloped
Signature Algorithm: md5WithRSAEncryption
Issuer: C=DE, ST=test, L=test, O=test, OU=test,
CN=test.net/[EMAIL PROTECTED]
Validity
Not Before: Apr 28 08:10:22 2005 GMT
Not After : Apr 28 08:10:22 2006 GMT
Subject: C=DE, ST=test, O=test, OU=test,
CN=test.n
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 4 (0x4)
Signature Algorithm: md5WithRSAEncryption
Issuer: C=DE, ST=test, L=test, O=test, OU=test,
CN=test.net/[EMAIL PROTECTED]
Validity
Not Before: Apr 28 08:10:22 2005 GMT
Not Afte
3.2 million certs! That's going to be "fun" when you get to certificate
rollover time!!!
What CA you using (I guess not openssl ca for that volume).
Dave
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of ray v
Sent: 29 April 2005 05:00
To: openssl-users@
but I still get this compile error.
I have been working off the assumption that it is an include error but
nothing I try fixes it. I have tried to include and
"/usr/include/openssl/evp.h".
Here is the compile error:
/usr/qt/3/bin/uic form1.ui -o form1.h
g++ -c -pipe -Wall -W -march=pen
SOLVED, thank you Michael D'Errico
Cutaway
Michael D'Errico wrote:
>> g++ -o hasher hasher.o form1.o moc_form1.o -L/usr/qt/3/lib
>> -L/usr/X11R6/lib -lqt -lXext -lX11 -lm
>
>
> You need to add -lcrypto and maybe -lssl.
>
> Mike
> _
Probably a good thing - all these zip files have been virus infested and I
don't think they are related to this mailing list at all in fact.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Rajeev Aggarwal
Sent: 04 May 2005 11:47
To: openssl-users@openssl.
Howsabout using openssl req ?
That does what U want I think you will find.
Dave
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Au
>If you want to separate the signature key from the encryption key, you
should have 2 keys, and not one key with 2 certificates.
Totally agreed - the reason for using key separation is that encryption keys
will (typically) have a shorter life time than signing keys (at least for
certificate valid
I've not been there, but is it possible that this is a PKCS#12 bag?
Dave
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated
Strictly speaking 1.2.840.113549.1.5.13 is the OID for the "PBES2 encryption
scheme" from PKCS#5 V2.
Dave
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listope
the
> > client, everything is OK.
> >
> > Proxies are like "internet diodes." As long as you follow their rules,
> > everything is OK.
> >
> > James Dabbs
> > [EMAIL PROTECTED]
> >
> > Director of Engineering
> > TGA Technol
Hi
Michael Helm wrote:
> > Is there a way to automate the process of importing a certificate file
> > into IE? The current way that I am using involves going to
> > 'internet options' and importing a certificate file from the certificates
>
> Are you looking for a customer-driven online solutio
> cheers
> maverick
>
-----
William C. Klein
Webmaster | Vax Systems Administrator
Valparaiso University
-
__
OpenSSL Project http://www.o
Hello
I'm using sslwrap with openssl 0.95a to forward an SSL connection to a
regular webserver. Everything works fine with Netscape on Win98.
Internet Explorer on Win98 does not work, SSL Handshake is done, but
hangs. On Win2000 its even worse, there, not even Netscape works
correctly.
This pro
Dear Openssl,
How do I check my apache web server install OpenSSL or not??
Fai, CHOW
GPE International Co., Ltd.
(Tel) 852-2410 7751
(Fax) 853-2410 7872
(E@) [EMAIL PROTECTED]
__
OpenSSL Project
talls.
-sam
Earlier today, I asked:
>
>To: [EMAIL PROTECTED]
>Subject: gcc (2.95.2) loops spawning cpp compiling cryptolib.c in openssl-0.9.6
>Date: Tue, 24 Oct 2000 12:01:17 -0400
>From: "Sam C. Nicholson !!" <[EMAIL PROTECTED]>
>
>Env:
>
>gcc -v
>g
then you NEED to check out www.CurrentFights.com a web site FULL of Streaming
Videos and audio's of the TOP Fights and Fighters of today SEE IT NOW !!!
__
OpenSSL Project http://www.o
/openssl/md2.h [File exists]
md2test.c => ../../test/md2test.c [File exists]
making links in crypto/md4...
Makefile => Makefile.ssl
md4.h => ../../include/openssl/md4.h [File exists]
md4test.c => ../../test/md4test.c [File exists]
md4.c => ../../apps/md4.c [File exists]
making lin
What am I missing? I'm pretty new to this SSL stuff.
--
David C. Tuttle -> [EMAIL PROTECTED] <-
__
OpenSSL Project http://www.openssl.org
User Support
MD5_Update()
and the SHA1_Update(), I also looked for the actual implementation of
these functions. While their signatures exist in md5.h and sha.h
respectively, I could not find any .c file within the source that
contained the function definition. According to my understanding, I
should also have
proxy engine is a C application that does a very
basic mimicry of what the engine is supposed to do and is running off a
Linux machine.
Still waiting. I know the answer's out there!!
Thank you,
- Ashwin
Output of openssl :
-
WITH ENGINE :
.
}
Does any one know why this could be happening?
Help,
- Ashwin
Ashwin C Uthappa wrote:
Hi all,
Just some updates
I used the openssl tool to try and establish communication with both
the engine (which fails) and the "proxy engine" (which succeeds). I've
pasted the output b
..
verify
BN_lshift1
verify BN_lshift
(fixed)
verify
BN_lshift
verify
BN_rshift1...
On Wed, 2003-06-11 at 00:20, David Schwartz wrote:
> > Thanks for the reply. I've read Netscape's SSL 3.0 draft twice...most of
> > the information is simply data type specification in Baukus Naur Form
> > with no reference to the construction of the packet itself.
>
> Since SSL is layered o
at's only about 6min download on a dial-up
connection.
So thus the people who merely shout in response "Install a spam/virus filter
on your personal computer" are missing the entire point about proactive
spam/virus protection. Spam/virus protection may begin at home, but it
code until after the signature has been verified. If I've
modified the code to to bad things, I can just as easily modify it to always
verify a signature on the tarball.
--
C. Harald Koch <[EMAIL PROTECTED]>
"It takes a child
er the usual Huge Argument, It was decided that 2050 or greater should use
GeneralizedTime, and <2050 should continue to use UTCTime. This way, if you
convert a certificate to internal format and back to DER, you get the same DER
without having to remember which Time format was used, which simp
omba4
bn_sqr_comba8
Is there a flag or something that needs to be set? Or is there a
library I have to get?
--
C. J. Keist Email: [EMAIL PROTECTED]
UNIX/Network ManagerPhone: 970-491-0630
Engineering Network ServicesFax: 970-491-2465
College of Engineering, C
Hello all. Two questions:
* Is there a group working on a SET
(Visa/Mastercard *sigh*) certificate
management solution?
* How do you all feel about Cleo?
Thanks!
Clark Evans
__
OpenSSL Project
ing through the
mod_ssl code to see what I could come up with
but i thought I would check here first
and see if you guys had any pointers.
Thanks in advance,
Joshua C. Bergeron
Hi there,
Sorry if this has been covered before... I'm working on some software
that needs to encrypt messages between two parties. I'm using OpenSSL's
EVP functions, and I'm wondering if I need to use EVP_Encrypt/DecryptInit
and EVP_CIPHER_CTX_cleanup for each message that I encrypt. I guess I'm
Thanks for your reply.
So, does EVP_CIPHER_CTX_cleanup free the context's memory as well as
clearing it, or is that left to me? I can't seem to find that in the man
pages...
Thanks again,
Haig
On 24 Jul 2001 12:36:22 +0100, Dale Peakall wrote:
> > I guess I'm unclear about whether a context is
Hello,
I was just wondering if using DH for key negociation (say, to generate a
128 bit blowfish key) reduces the number of potential keys in a way that
significantly affects security. How much less safe is using a DH key as
a blowfish key than using a random string, for example?
Thanks,
Haig D
Har har. ;)
What takes everything so long to be set up then if I use a 512-bit key?
Is it the prime number?
h
On Thu, 2001-10-25 at 23:16, Michael Sierchio wrote:
> Haig C Didizian wrote:
>
> > Does anyone happen to know how many more 512-bit DH keys there are than
> >
Hi, as per usual, I'm a relative OpenSSL newbie. I have managed to get client
side apps working without too much effort, but I'm running into problems
getting a server side app up and running under OpenBSD 3.0.
I created a certificate and key just for my sample app, whose source code is
below.
Hi,
I am using openssl-0.9.8e. Can someone help me with making use of ECDSA
with 224bit public and private keys?
Regards,
Kiran
encoding routines:ASN1_CHECK_TLEN:wrong
tag:tasn_dec.c:1294:
19331:error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1
error:tasn_dec.c:380:Type=EC_PRIVATEKEY
19331:error:10092010:elliptic curve routines:d2i_ECPrivateKey:EC
lib:ec_asn1.c:1116:
Regards,
Kiran
wrong
tag:tasn_dec.c:1294:
19387:error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1
error:tasn_dec.c:380:Type=EC_PRIVATEKEY
19387:error:10092010:elliptic curve routines:d2i_ECPrivateKey:EC
lib:ec_asn1.c:1116:
[EMAIL PROTECTED] crypt]$
-Original Message-
From: [EMAIL PROTECTED] [m
Hi All,
Is there any crypto function similar to the below one,
int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
AES_KEY *key);
for EC,
int EC_set_private_key(const unsigned char *userKey, const int bits,
EC_KEY *key);
int EC_set_public_key(const unsigned char *userKe
Hi All,
I am using ECDSA with 224 bit secp224r1 curve. But the signature I am
getting is of size 64bytes; shouldn't it be 56 bytes (r||s)? Also its
not 56bytes + 8bytes zero's padding. Please help me.
Thanks,
Kiran
__
OpenSSL Proj
Hi All,
I am using elliptic curves. And, I am setting the value of private key
filed in EC_KEY structure before calling EC_KEY_generate_key. Every time
I am getting different values of the public key.
I need a help. In,
W=sG.
Where,
W is the public key
S is the private key and
G is the base point
Hi,
You should have received the certificate in PEM or DER format. No need
to save the file .txt format.
Do openssl -inform "whichever form PEM or DER" -in
-noout -text
This will dump the text form of the certificate.
Regards,
Kiran
From: [EMAIL PROTE
it
into SSL.pem
format taking my file SSL.der in question
Thanks again
Sorry for the trouble
Thanks and Regards
Kaushal
On 8/6/07, C K KIRAN-KNTX36 < [EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]> > wrote:
Hi,
You should have received the certificate in PEM or DER format. No
Hello,
1)
> > Give the above constraints which of the curve definitions in
> > crypto/curve/ec_curve.c would fit within my requirements?
Have a look at the below link if you have the acess.
http://grouper.ieee.org/groups/1363/Research/Other.html#ANSI
>2)What are the functions/APIs
Hi Alex,
It looks like, you are using NID value in the place of curve name.
Please verify once.
Regards,
Kiran
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:owner-openssl-
> [EMAIL PROTECTED] On Behalf Of Alex Pokotilo
> Sent: Monday, October 01, 2007 1:09 PM
> To: openssl-users@
se the above curves only.
Regards,
Kiran
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:owner-openssl-
> [EMAIL PROTECTED] On Behalf Of C K KIRAN-KNTX36
> Sent: Monday, October 01, 2007 1:55 PM
> To: openssl-users@openssl.org
> Subject: RE: EC_KEY_new_by_cur
Try just touching those directories. Hopefully that should fix your problem.
The problem i guess here is that, your make is running
some test cases to generate some kind of certificates and its failing.
Regards,
Kiran
From: [EMAIL PROTECTED] on behalf of Sisy
From: [EMAIL PROTECTED] on behalf of Sisyphus
Sent: Tue 22-Jan-2008 5:23 PM
To: openssl-users@openssl.org
Subject: Re: 'make test' error - "I am unable to access the ./demoCA/newcerts
directory"
- Original Message -
From: "C K KIRAN-KNTX36"
Hello,
When I was trying to export a certificate from IE, it states a file
extension of p7b. If this is a PKCS7 format certificate, what 's the
difference between p7b and p7c?
What is BER? I just know DER is Distinguished Encode Rules. In Openssl,
I could (in many case) choose bet
Hello
I am new to this newsgroup, additionally new to openssl.
I would like to encrypt messages sent from server to client, after
reading through various documents on the Internet I have figured out a
process that _appears_ to work.
I would appreciate if someone could verify that it is indeed co
Hello
I am new to openssl.
I want to set up a system that is multi-tiered, with a master server
that has a self-created CA, intermediate servers that (possibly) have
their own CA's and clients that have certificates that are used to sign
outgoing email (from the client machine).
Basically the sy
a CA chain.
In my Internet searches for Chained CA's I only retrieve results to
other sites that have chained CA's and how to import the chain of trust
in the browser/server, etc. but I can't find any documentation with
regards to actually creating them.
Thanks!
Waitman
On Wed,
On Wed, 2002-12-04 at 09:19, Chad Morland wrote:
> Hi,
> I recently recieved a certificate from Verisign and when I try and
> install it into my server I get the following error.
>
> [11:45am]# openssl verify server.crt
> server.crt: unable to load certificate file
> 18589:error:0D0A2007:asn1
On Wed, 2002-12-04 at 14:21, Robert Fitzpatrick wrote:
> I installed openssl-0.9.6g on my RedHat box, with the engine. Now, when
> I try to install openssh-3.5p1, it errors on the configure build telling
> me that the openssl headers do not match and shows the OpenSSL 0.9.6g as
> the header version
On Wed, 2002-12-04 at 18:23, Waitman C. Gobble, II wrote:
> Also, you can probably edit your /etc/ld.so.conf and place the path to
> the openssl 0.9.6g headers at the TOP of the list.
>
> And then run
>
> /sbin/ldconfig
>
Sorry, I meant "libraries" not &
On Wed, 2002-12-04 at 20:00, Robert Fitzpatrick wrote:
> >
> > I uninstalled each RPM that was listed with
> > rpm -e --nodeps
> >
Hello, does this mess anything else up? The FAQ page states that Red Hat
says this is a no-no, that other RH packages on the system _need_ the RH
distro openssl.
will post an updated copy in about
five minutes.
Take care,
--
Waitman C. Gobble, II
EMK Design +1.7145222528 http://emkdesign.com
Public Keyhttp://pgp.emkdesign.com
Find an example http://freakinexample.com
smime.p7s
Description: application/pkcs7-signature
Hello
I use rewrite (apache) on sites without any C hack. Perhaps I am
mis-understanding your question.
Here is an example config that I have had previously in production:
# secure.alleratin.com
ServerAdmin [EMAIL PROTECTED]
DocumentRoot /www/web/a/alleratin/html
Hello,
I have been reviewing the Visa CISP questionnaire. It is about 90
questions
relating to the security and storage of credit card account information.
Visa
intends to have compliance from all active merchants by the first
quarter of 2004.
(My guess is that one shall not be an active mercha
Hello,
I am positive that there is a perl module, there just has to be. I
haven't used it though.
If you aren't exactly stuck on perl, you might have a look at the
openssl functions in php:
http://us3.php.net/manual/en/ref.openssl.php
Take care,
Waitman Gobble
EMK Design
Telephone (714) 522-
Dear all,
Please help.
I wish to use OpenSSL cryptography for developing an application. However I
am not sure how to do that? Is there any reference, example, or perhaps
tutorial for using the OpenSSL crypto? Please help.
Thanks.
Best regards,
---
Dear Dirk,
> Have a look at http://www.iconsinc.com/~agray/ossldev/nt and pick the
> workspace for the version of OpenSSL you want to use (you'll still need to
> download the src tarball of OpenSSLvx.y.z).
>
> CU,
> Dirk
Thanks for your reply. I don't understand here.
All I wish to do is to use
Dear All,
Thousand thanks for your help. I really appreciate that. Your help really
means a lot to me...
Now, the problem is about the VC setting,
I am not sure how to set the directory settings for the project
For example, I copied all the files from the direc
Title: ??: Please Help: Crypto library with Visual C++
thousand thanks for your help :D
it
helps a lot and it works fine now...
Now,
pls. one more thing,
I
tried to decode a Base64 encoded string into
the
string is (for example)
:KljL0/zpzt8Y
Title: ??: Please Help: Crypto library with Visual C++
Dear
Yong Yue
I am
sorry to bother you again. The description is clear enough on the URL you gave
me.
However, I looked at the BIO explanation on http://www.columbia.edu/~ariel/ssleay/bio.html
I am
not sure how to read in some data
Title: ??: Please Help: Crypto library with Visual C++
Hi,
Thanks
for your reply. I have tried, still the memory leak problem happens
:)
and
the whole application crashes
my
code is like this:
BIO *bio, *b64; BIO
*bio_out; char inbuf[128]; int
inlen; b64 = BIO_new(BIO_f_base64
101 - 200 of 217 matches
Mail list logo