08-19-2002
Since English is my second laungue and I'm a newbie to Unix maybe I did explain things a little unclear.
I will let you know if I solve the problem.
Thanks!
10 More Discussions You Might Find Interesting
1. SuSE
i have installed suse linux 10 ,but i am not able to connect to the internet.i am learning unix now. i am new to this operating system. (2 Replies)
Discussion started by: viswareddy.32
2 Replies
2. UNIX for Dummies Questions & Answers
Hi Everyone,
Good day.
Scenario:
2 unix servers -- A (SunOS) and B (AIX)
I have an ftp script to sftp 30 files from A to B which happen almost instantaneously i.e 30 sftp's happen at the same time.
Some of these sftp's fail with the following error:
ssh_exchange_identification: Connection... (1 Reply)
Discussion started by: jeevan_fimare
1 Replies
3. UNIX for Advanced & Expert Users
Hello
I'm facing the above problem while doing a performance run. I've a script which I'm launching from my windows desktop using mozilla. The script will invoke backend action on a Solaris host which in turn feeds the records to a driver located on a linux box(Cent OS).
What's happening is... (1 Reply)
Discussion started by: subramanyab
1 Replies
4. Solaris
Hi everyone,
I am hoping anyone of you could help me in this weird problem we have in 1 of our Solaris 10 servers. Lately, we have been having some ftp problems in this server. Though it can ping any server within the network, it seems that it can only ftp to a select few. For most servers, the... (4 Replies)
Discussion started by: labdakos
4 Replies
5. Solaris
Hi all,
I have just installed SunOS 10 at the first PC and exceed (pc-x server) at the second.
I'm trying to connect to the first pc via exceed softvare. After entering login and pass, the exceed window immidiate close without any errors (if CDE or JDS has been chosen). Via exceed working just... (0 Replies)
Discussion started by: Marauder62
0 Replies
6. Shell Programming and Scripting
Hi,
I'm trying to write a script which will run a select on db.
#!/usr/bin/ksh
SQL_INPUT_FILE=file_name.sql
SQL_OUTPUT_FILE=output.txt
MANPATH=/usr/share/man:/opt/SUNWspro/man:/usr/local/man... (2 Replies)
Discussion started by: ozum
2 Replies
7. AIX
Hi,
I have a server AIX 5.3
Few people have the root password and somebody used the root login to erase a file (command rm in the .sh_history of root). :mad:
I would like to know if a file exist with what ip address has been connected.
I want to find the guilty!!! :D
Thanks guys (2 Replies)
Discussion started by: Castelior
2 Replies
8. UNIX for Advanced & Expert Users
Hi everybody,
I am running a program on a supercomputer via my personal computer through a ssh connection. My program take more than a day to run, so when I left work with my PC I stop the connection with the supercomputer and the program stop.
I am wondering if someone know how I can manage... (2 Replies)
Discussion started by: TomTomGre
2 Replies
9. UNIX for Dummies Questions & Answers
hi Im unable to find how this script in conencting to DB and which DB and job is scheduled in TWS to run this script.
Any sugggestion where to look for or how to get information.
please find below part of script for DB conenction.
##### SET VARIABLES ##################
rundate=`date... (1 Reply)
Discussion started by: saif2825
1 Replies
10. Shell Programming and Scripting
How can we connect to remote computers with a bash script.? (1 Reply)
Discussion started by: diw10
1 Replies
LEARN ABOUT CENTOS
evp_pkey_verify_recover
EVP_PKEY_verify_recover(3) OpenSSL EVP_PKEY_verify_recover(3)
NAME
EVP_PKEY_verify_recover_init, EVP_PKEY_verify_recover - recover signature using a public key algorithm
SYNOPSIS
#include <openssl/evp.h>
int EVP_PKEY_verify_recover_init(EVP_PKEY_CTX *ctx);
int EVP_PKEY_verify_recover(EVP_PKEY_CTX *ctx,
unsigned char *rout, size_t *routlen,
const unsigned char *sig, size_t siglen);
DESCRIPTION
The EVP_PKEY_verify_recover_init() function initializes a public key algorithm context using key pkey for a verify recover operation.
The EVP_PKEY_verify_recover() function recovers signed data using ctx. The signature is specified using the sig and siglen parameters. If
rout is NULL then the maximum size of the output buffer is written to the routlen parameter. If rout is not NULL then before the call the
routlen parameter should contain the length of the rout buffer, if the call is successful recovered data is written to rout and the amount
of data written to routlen.
NOTES
Normally an application is only interested in whether a signature verification operation is successful in those cases the EVP_verify()
function should be used.
Sometimes however it is useful to obtain the data originally signed using a signing operation. Only certain public key algorithms can
recover a signature in this way (for example RSA in PKCS padding mode).
After the call to EVP_PKEY_verify_recover_init() algorithm specific control operations can be performed to set any appropriate parameters
for the operation.
The function EVP_PKEY_verify_recover() can be called more than once on the same context if several operations are performed using the same
parameters.
RETURN VALUES
EVP_PKEY_verify_recover_init() and EVP_PKEY_verify_recover() return 1 for success and 0 or a negative value for failure. In particular a
return value of -2 indicates the operation is not supported by the public key algorithm.
EXAMPLE
Recover digest originally signed using PKCS#1 and SHA256 digest:
#include <openssl/evp.h>
#include <openssl/rsa.h>
EVP_PKEY_CTX *ctx;
unsigned char *rout, *sig;
size_t routlen, siglen;
EVP_PKEY *verify_key;
/* NB: assumes verify_key, sig and siglen are already set up
* and that verify_key is an RSA public key
*/
ctx = EVP_PKEY_CTX_new(verify_key);
if (!ctx)
/* Error occurred */
if (EVP_PKEY_verify_recover_init(ctx) <= 0)
/* Error */
if (EVP_PKEY_CTX_set_rsa_padding(ctx, RSA_PKCS1_PADDING) <= 0)
/* Error */
if (EVP_PKEY_CTX_set_signature_md(ctx, EVP_sha256()) <= 0)
/* Error */
/* Determine buffer length */
if (EVP_PKEY_verify_recover(ctx, NULL, &routlen, sig, siglen) <= 0)
/* Error */
rout = OPENSSL_malloc(routlen);
if (!rout)
/* malloc failure */
if (EVP_PKEY_verify_recover(ctx, rout, &routlen, sig, siglen) <= 0)
/* Error */
/* Recovered data is routlen bytes written to buffer rout */
SEE ALSO
EVP_PKEY_CTX_new(3), EVP_PKEY_encrypt(3), EVP_PKEY_decrypt(3), EVP_PKEY_sign(3), EVP_PKEY_verify(3), EVP_PKEY_derive(3)
HISTORY
These functions were first added to OpenSSL 1.0.0.
1.0.1e 2013-02-11 EVP_PKEY_verify_recover(3)