|
by: Ramy076 |
last post by:
I have a C App which uses openssl for Encoding and decoding which
needs to be ported to java.
The decoded text does not match between the C App and the java App.
The size of the output itself is wrong. I think i am doing something
basically wrong. pls help.
Output is not the same as seen here because of special characters
Output from C: is only 12 bytes long
|
by: Oliver Kurz |
last post by:
Hello,
I have a problem by converting a string to base64 and back again.
I have a string with german special chars like äöüß.
This string i convert with base64str=base64.encode('äöüß') into a base64 representation.
Backwards I got an error:
|
by: gRizwan |
last post by:
Hello all,
We have a problem on a webpage. That page is sent some email data in
base64 format. what we need to do is, decode the base64 data back to
original shape and extract attached image from it.
Any help will be highly appriciated.
Thanks
|
by: Julia |
last post by:
Hi
I am trying to pass an encoded string to a JavaScript
the following is the C# code which convert the string STRING_TO_ENCODE to
base64
byte bytIn =
System.Text.UnicodeEncoding.Unicode.GetBytes(STRING_TO_ENCODE);
string result=System.Convert.ToBase64String
|
by: BB |
last post by:
Hello.
i am trying to decode a block of (what i think is) base64 into text,
and i have NO idea how to begin. I'm going to paste the whole string
here, but i want to know the steps necessary to convert it to text.
i've tried the usual binary/ascii techniques, but they just seem to
loop back in to each other. what is the step by step to get from
base64 to text? this is for an evil riddle i'm trying to solve.
thanks. Becca. here's the...
|
|
by: Jeremy Kitchen |
last post by:
I have encoded a string into Base64 for the purpose of encryption. I
then later decrypted it and converted it back from Base64 the final
string returns with four nothing characters.
"pass" what the result should be
"pass____ what the result is where each underline char is a nothing
char.
I am about to write a function that will remove the nothing chars butI
would like to know what is causing the problem and simply avoid it
|
by: pycraze |
last post by:
Hi ,
I am currently trying to implement base64 encoding and decoding
scheme in C . Python has a module , base64 , that will do the
encoding and decoding with ease . I am aware of OpenSSL having support
for base64 encoding and decoding , but i will have to now implement
both in C without using the openssl libraries .
I was able to download a code w.r.t. base 64 encoding and
decoding . I am attaching the code below .
|
by: d-fan |
last post by:
void decodebio( unsigned char *encbuf, unsigned char * decbuf, int
destbuf ) {
/* Read Base64 encoded data from standard input and write the
decoded data to standard output: */
BIO *b64, *bio ;
long i ;
char buffer ;
memset(buffer, 0, 512) ;
|
by: ashu |
last post by:
I am searching for Win32 (or WinMobile) API for converting ASCII
string to Base64 and vice-versa can anyone help me out....
Thanks in advance...
|
by: Bryan A |
last post by:
I'm having a problem decoding an encrypted Base64 string (with a key).
I am trying to encode and decode with a url friendly version. It works
if I use them seperate but when I try to put them both in the same
function it doesn't decrypt it right.
function encrypt($string, $key) {
$result = ”;
for($i=0; $i<strlen($string); $i++) {
$char = substr($string, $i, 1);
$keychar = substr($key, ($i % strlen($key))-1, 1);
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|