On Thu, Jan 01, 2009 at 06:26:49PM -0800, David Schwartz wrote:
>
> Edward Diener wrote:
>
> > > 1) You need someone to confirm that having a client use a
> > > known-compromised
> > > private key to authenticate over SSL is no worse than the
> > > client using no
> > > key at all. It seems to m
Edward Diener wrote:
> > 1) You need someone to confirm that having a client use a
> > known-compromised
> > private key to authenticate over SSL is no worse than the
> > client using no
> > key at all. It seems to me like you'd almost have to try to make this a
> > problem, but who knows -- mayb
On Fri, Jan 02, 2009 at 02:05:10AM +0300, Taras P. Ivashchenko wrote:
> Hello, list!
>
> I found in archive [0] discussion about how to check if
> certificate is self-signed. But I can't find there solution how can I do it
> from application.
>
> At the moment I need to check this (if given cer
Hello, list!
I found in archive [0] discussion about how to check if
certificate is self-signed. But I can't find there solution how can I do it
from application.
At the moment I need to check this (if given certificate is self-signed) from
application I developed.
And now I simply compare Issu
On Wed, Dec 31, 2008 at 09:16:06AM -0800, dan_mit...@ymp.gov wrote:
> Don't you have to check the root CA certificate too??
No, in fact one specifically must not, because the root CA cert is
self-signed and there are no chosen-prefix attacks against the self-signed
root CA. Even if you could get
On Thu January 1 2009, Edward Diener wrote:
> Michael S. Zick wrote:
> > On Thu January 1 2009, Edward Diener wrote:
> >> Perhaps your seeing this shows why I was at least nominally concerned
> >> about the MySQL client having its own public key-private key
> >> certificates. I have tried to find
David Schwartz wrote:
Edward Diener wrote:
Perhaps your seeing this shows why I was at least nominally concerned
about the MySQL client having its own public key-private key
certificates. I have tried to find out what actual use the client's
public key-private key has in MySQL, from either the
Michael S. Zick wrote:
On Thu January 1 2009, Edward Diener wrote:
Perhaps your seeing this shows why I was at least nominally concerned
about the MySQL client having its own public key-private key
certificates. I have tried to find out what actual use the client's
public key-private key has i
Hi,
Has anyone done openssl performance benchmarks on Intel's latest Nehalem
processor a.k.a. Core i7? Since there are lot of improvements in this
processor, wanted to see how openssl's performance improves. Appreciate if
you can share your experience on this?
Thanks,
Nagaraj
Edward Diener wrote:
> Perhaps your seeing this shows why I was at least nominally concerned
> about the MySQL client having its own public key-private key
> certificates. I have tried to find out what actual use the client's
> public key-private key has in MySQL, from either the client or the
>
On Thu January 1 2009, Michael S. Zick wrote:
>
http://dev.mysql.com/doc/refman/5.1/en/grant.html
> On Thu January 1 2009, Edward Diener wrote:
> > Perhaps your seeing this shows why I was at least nominally concerned
> > about the MySQL client having its own public key-private key
> > certific
On Thu January 1 2009, Edward Diener wrote:
> Perhaps your seeing this shows why I was at least nominally concerned
> about the MySQL client having its own public key-private key
> certificates. I have tried to find out what actual use the client's
> public key-private key has in MySQL, from eit
David Schwartz wrote:
I can understand your summary quite clearly.
Great.
Suppose the server encrypts data it sends to the client and the client
needs to decrypt that data. This is the case when my client SELECTs data
from the MySQL database. Does this need a different sequence than the
seque
On Thu January 1 2009, Frank B. Brokken wrote:
> Hi Mike,
>
> Thanks for your postings in reply to my base64 decoding problem. I must admit
> that I saw your first posting only after sending out the reply to William, so
> let's correct that here :-)
>
> In your last posting you wrote:
>
> > Are
Hi Mike,
Thanks for your postings in reply to my base64 decoding problem. I must admit
that I saw your first posting only after sending out the reply to William, so
let's correct that here :-)
In your last posting you wrote:
> Are you stripping the bytes that might appear in the stream
> that do
On Tue, Dec 30, 2008, Chikkanagappa, Manjula wrote:
> Hello Everyone!
>
>
>
> I have FIPS 1.2 modules and 0.9.8 stable development version
> (12/30/2008) OpenSSL modules. I am invoking FIPS_mode_set(1) in my
> application. The FIPS_mode_set(1) returns 0 all the time. I have written
> a small
(I resend message, as it appears as previous not hit the list)
Hello,
I need convert LDAP accounts to passwd/shadow. Problem is password
conversion: from LDAP DB I obtain some as (I know that plain password
is string "heslo"):
userPassword:: e01ENX1sVjJ3dUI3eG1KdEtUZjZ1Z0dHcHBnPT0=
value is bas
Don't you have to check the root CA certificate too??
Please respond to openssl-users@openssl.org
Sent by:owner-openssl-us...@openssl.org
To: openssl-users@openssl.org
cc: (bcc: Dan Mitton/YD/RWDOE)
Subject:Re: Interesting article
LSN: Not Relevant - Not Privileged
User
Hello All,
I am using openssl version OpenSSL 0.9.8a 11 Oct 2005
The problem i am facing is when converting .pem certificate( having both
private and public key ) to .pfx format as below i am getting an error
#
*[as...@asish todel]$ openssl pkcs12 -export -out
Hello Everyone!
I have FIPS 1.2 modules and 0.9.8 stable development version
(12/30/2008) OpenSSL modules. I am invoking FIPS_mode_set(1) in my
application. The FIPS_mode_set(1) returns 0 all the time. I have written
a small test program with just FIPS_mode_set(1) call. And the call still
fail
20 matches
Mail list logo