In message <[EMAIL PROTECTED]> on Thu, 26 Feb 2004 12:43:12 +0100, Andreas Feldner
<[EMAIL PROTECTED]> said:
feldner> I'm wondering what to do to extend the validity of the
feldner> certificate of sort-of a sub-CA. Currently, I'm using the
feldner> openssl ca command. The current certificate expi
i'm waiting
<>
Stephen:
Following these directions "If you kept the source tree from your last installation,
upgrading is even easier. The file config.nice in the root of the old source tree
contains the exact configure command line that you used to configure the source tree.
Then to upgrade from one version
On Thu, Feb 26, 2004, [EMAIL PROTECTED] wrote:
> Stephen:
>
> Following these directions "If you kept the source tree from your last
> installation, upgrading is even easier. The file config.nice in the root of
> the old source tree contains the exact configure command line that you used
> to con
Hi list,
I need to know how to calculate the fingerprint for public/private RSA/DSA keys. (4
possibilities).
Right now, for both public and private keys, I get the same fingerprint (which I think
is wrong). I
think I'm missing some fields needed for private keys, which ones? i.e., Will the
c
On Thu, Feb 26, 2004, Mike Gagnon wrote:
> Hi list,
>
> I need to know how to calculate the fingerprint for public/private RSA/DSA keys. (4
> possibilities).
>
> Right now, for both public and private keys, I get the same fingerprint (which I
> think is wrong). I
> think I'm missing some fiel
Hi Dr. Henson,
Thanks for your reply, I don't want the same fingerprint for private keys - that's
where my problem
is coming from. I have an interface that shows both public and private keys - and
they're
enumerated by fingerprint. The uniqueness of the fingerprint guarantees a different
key
On Thu, Feb 26, 2004, Ronan Daniellou wrote:
>
>
> Hello everyone,
>
>
> did anybody already use SSL/TLS over a non TCP-UDP/IP socket successfuly?
>
You can't use SSL/TLS over UDP due to its unrealiable nature though a draft
standard is being discussed in the ietf-tls mailing list to allow S
Hello everyone,
did anybody already use SSL/TLS over a non TCP-UDP/IP socket successfuly?
Thanks,
Ronan
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EM
> Hello,
>
> oh sorry, i'm using linux! the secure network connection must be
> implemented in a modified linux-kernel!
> still i'm searching for a possibility like i can realize it ... till
> present i still have no experiences with openssl-programing.
> therefore, it is an advantage to known whe
I hope I'm using this mailing list correctly, as this is the 1st time I've used a
majordomo service. If I'm using the mailing list incorrectly, I appologize in
advance! Anyway, here is my question:
I want to create a certificate that is self signed, which will be used for an https
connection
Why not use IPsec. Why does it have to be in the kernel? It's hard
to see what the security trade-offs are that make this necesary.
--
Rich Salz Chief Security Architect
DataPower Technology http://www.datapower.com
XS40 XML Security Gateway http://www.datapower.com/prod
Thank you for your answer,
in fact what I am trying to do is to use TLS over a bluetooth socket. I
use the L2CAP layer which is reliable. So it should work (as the
specification of SSL/TLS says, we can use any protocol). Nevertheless
when I use SSL_set_fd, I get no error. My client is sending
I'm testing Triple DES encryption speeds with the OpenSSL library on Linux
on my machine.
With dynamic linking, I get about 16 Mbytes per second whereas with static
linking, I get only about 5 Mbytes per second. For compiling, I used:
DYNAMIC: gcc testdes.c -o testdes-dyn -lcrypto
STATIC: gcc te
14 matches
Mail list logo