In message <[EMAIL PROTECTED]> on Mon, 2 Jun 2003 21:27:10 -0500, "Aaron Axelsen"
<[EMAIL PROTECTED]> said:
axelseaa> Currently I am running OpenSSL 0.9.6g, and I am looking to upgrade.
axelseaa> My question is what is the different between 0.9.6i and 0.9.7b??
axelseaa> Which one will be easiest
Hi,Steve,
Thank you. Let me ask more
:^)
I am reading the
function:
int OCSP_basic_verify(OCSP_BASICRESP *bs,
STACK_OF(X509) *certs,X509_STORE *st, unsigned long
flags) in ocsp_vfy.c.
I notice that it is
possible that the certificate of the signer of the ocsp response i
Title: 0.9.6j vs 0.9.7b
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello,
Currently I am running OpenSSL 0.9.6g, and I am looking to upgrade.
My question is what is the different between 0.9.6i and 0.9.7b??
Which one will be easiest to upgrade from 0.9.6g? Or is there no
difference? Tha
Hi ,
I am currently using Openssl to generate CA and server/client key certs.
Right now, the Openssl prompt me for password when generating CA key/cert:
openssl req -new -x509 -days 3650 -keyout cakey.pem -out
trusted_ca_cert.pem -config openssl.cnf
(1) Is there a way to use the password as a p
I have done this with packetsniffers. Several good pay or free ones are
available. They clearly show plain text , html, or any other part of the
data packet as it enters/exits the NIC. Then if an SSL session is initiated,
you can watch the certificate and its information passed in clear text, an
To a p800 using different technics both using a file and downloding it from a web page.
Trying different extensions and MIME types but no luck ...
> --- Ursprungligt meddelande ---
>
> Från: Dr. Stephen Henson <[EMAIL PROTECTED]>
> Ämne: Re: How do one add a client certificates on a p80
Title: Message
Hello,
Currently I am running OpenSSL 0.9.6g, and I am looking to
upgrade. My question is what is the different between 0.9.6i and 0.9.7b??
Which one will be easiest to upgrade from 0.9.6g? Or is there no
difference? Thanks is advance your
your assistance, it is much appreci
Hello, I need renegotiate the ssl connection
and I do it with:
SSL_renegotiate
SSL_do_handshake
but the other side of the SSL connection show this
error:
Incorrect version
number
but the version is the same as the previus
conection: 3.1
Somebody can help me?
Sorry, figured it out. NIST listed P as an int instead of a hex like
the others!!!
Original Message
Subject: ECC ectest.c, curve attributes
Date: Mon, 02 Jun 2003 10:07:36 -0400
From: Frank <[EMAIL PROTECTED]>
To: Openssl user grp <[EMAIL PROTECTED]>
I was checking the FIPS 1
I was checking the FIPS 186-2
(http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf)
parameters for the curve parameters and something does not make sense.
Looking at the ectest.c the values for say P192 for b, x, z are the same
but for p & a they are not. am I missing something?
10 matches
Mail list logo