|
by: Kim HM |
last post by:
I Have a .NET program sending mails using CDOEX.
These mail I need to sign. I god a tip that i shoud use CAPICOM. That worked
fine sending a mail with signature.
BUT the problem is that I have to type the password for my certificate every
time my program signs a mail :o(
My program is a windows service running on a server so typing passwords is
bad.
|
by: Michael Bebenita |
last post by:
Hi,
A Java application is encrypting a block of text using 3DES ECB mode
and PKCS5 padding. I need to decrypt this text using C#. I've
extracted the 192 bit key using the getEncoded() method of the
SecretKey Java class. However when I use this key in .NET i cannot
decrypt the cipher text.
I am pretty sure that all my settings are correct, as far as setting
the ECB mode, PKCS5 padding and converting the cipher text to byte
|
by: Dave Bailey |
last post by:
I have an application installed on a web server. When forst intalled it worked fine. The administrator rebooted the server and then when accessing the app the folowing error appears:
CryptoAPI cryptographic service provider (CSP) for this implementation could not be acquired.
I am using DPAPI(Machine Store) to encrypt a connection string. The decryption code is as follows:
private string GetConnectionString()
{
DataProtector dp...
|
by: Greg Merideth |
last post by:
I've finally got my client/server secure soap process working and I've
just noticed that under the servers
\NetworkService\AppData\MS\Crypto\RSA folder there are some
100+ paired sets of RSA keys.
I don't setup RSACryptoServiceProvider using CspParameters and I didn't
give the RSA initiator any paramters when I setup the class yet, each
implementation of the RSA class, as a web service, is creating a
cryptoAPI storage bin for the RSA...
|
by: no game |
last post by:
I have a problem with signature using RSACryptoServiceProvider
I use
signature=privKey.SignData(byteData, new MD5CryptoServiceProvide),
and get a byte array of signature.
The other party use CryptoAPI C++ function:
|
|
by: Bonj |
last post by:
Hi
i have a question regarding the CryptoAPI.
I can seemingly call CryptAcquireContext, and if I pass any random string as
the key container name and NULL as the provider name, with CRYPT_NEWKEYSET
as the last parameter, then the rest of the crypt functions seem to work.
But I came across an instance when I stopped debugging the program, before I
had called CryptReleaseContext, and when I ran the program again, I got
FALSE returned, and...
|
by: Mike P |
last post by:
This is a very weird problem, when I boot my IIS server I get a CryptoAPI
cryptographic service provider (CSP) for this implementation could not be
acquired exception. However, once I access my site within the server, the
exception goes away. My ASP page only displays the logon user (only 2 lines
of code). I don't understand this behavior at all.
|
by: =?Utf-8?B?VmVuZWRpY3Q=?= |
last post by:
Hi All,
I have a program written in VB6 which utilize CryptoAPI to encrypt bitmap
file.
I'm writting a new program in C# 2005 to decrypt those encrypted bitmap file
by adding the CryptoAPI reference in my C# project. Everything seem fine, i
have no problem when execute the program.
But when I click the button to decrypt the bitmap file, there is an error
|
by: MichaelAni |
last post by:
Hi,
I have a requirement to develop an component in VC++ and .net for encryption/decryption. I am deriving a key from a password.
But when i encrypt the data VC++(cryptoapi) component and .net are giving different output. how can i resolve this. In. .net component i am using "PasswordDeriveBytes" class to generated the key.
algorithm used in "RC2" and Hash used in MD5.
Pleae help
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look !
Part I. Meaning of...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|