Hi,
I need APIs which can
1) sign the message using a key
2) verify the same using the *same *key.
Let me know if it is available.
Raghunath
> From: owner-openssl-us...@openssl.org On Behalf Of Serge Fonville
> Sent: Wednesday, 12 August, 2009 04:01
> >> Recently there has been some discussion on the Internet
> regarding so
> >> called null-prefix attacks, see
> >> http://www.thoughtcrime.org/papers/null-prefix-attacks.pdf. Is
> >>
hi,
your pkcs11 on the Sparc system is fast(!) its just the verification
that seems a little b0rked/slow :-|
alan
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
Hi,
Hodie Id. Aug. MMIX, CH-Kami scripsit:
> I'm currently working on a project involving a Sun T5120 and some crypto...
> (I'm also new to OpenSSL & T2)
>
> T2 is supposed to be quite fast for crypto operations :
>
> openssl speed rsa
>signverifysign/s verify
On Thu, 13 Aug 2009, CH-Kami wrote:
>I'm currently working on a project involving a Sun T5120 and some crypto...
>(I'm also to to OpenSSL & T2)
hi, this is probably not the best alias since OpenSSL team has
nothing to do with the PKCS#11 engine that is shipped with Solaris.
>T2 is suppo
Hi,
I'm currently working on a project involving a Sun T5120 and some crypto...
(I'm also to to OpenSSL & T2)
T2 is supposed to be quite fast for crypto operations :
openssl speed rsa
signverifysign/s verify/s
rsa 512 bits 0.0047s 0.0005s210.7 207
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
deblarinteln wrote:
| Hi Goetz,
Hello deblarinteln,
| | It is called subjectAltName extension.
|
| would you mind telling me how and where I have to define the AltName(s) ?
There is the man page x509v3_config.
It should contain the info you need.
A
On Thu, Aug 13, 2009 at 2:22 PM, wrote:
>
>>On Thu 13/08/09 4:46 AM , Sudarshan Soma sudarshan...@gmail.com sent:
>>Hi
>>Can anone please clarify this data with OPENSSL 0.9.8i:
>>
>>RSA uses key ranges from 768-2048 and can operate only in CBC mode
>>
>>DSA uses key length of 1024 and operates onl
Hi Serge,
| Use a wildcard domain for your CN
| Unless each domain had a separate IP
| You need to specify *.mydaomin.tld as the CN
so, my CN entry should look like this, if I get you right:
*.mydomain.tld
and the subdomains would get then kinda automically the certificate or will
I have to
Hi Goetz,
| It is called subjectAltName extension.
would you mind telling me how and where I have to define the AltName(s) ?
And still, how will I get my *.pem certificate converted into a .cer
certificate?
Thanks a lot
Niels
--
View this message in context:
http://www.nabble.com/Howto-cr
>On Thu 13/08/09 4:46 AM , Sudarshan Soma sudarshan...@gmail.com sent:
>Hi
>Can anone please clarify this data with OPENSSL 0.9.8i:
>
>RSA uses key ranges from 768-2048 and can operate only in CBC mode
>
>DSA uses key length of 1024 and operates only in CBC
? CBC chaining mode only applies to sym
11 matches
Mail list logo