> From: owner-openssl-us...@openssl.org On Behalf Of Michael D
> Sent: Wednesday, 30 September, 2009 17:58
> I don't mind digging in and trying to figure out why the crash..
> but could somebody point me in the right direction?
> Thanks,
> Mike
>
> CONNECTED(0003)
> depth=0
> /C=US/ST=Minne
> From: owner-openssl-us...@openssl.org On Behalf Of Jeff Strope
> Sent: Thursday, 01 October, 2009 18:41
> I've been given an X509 signing certificate that I'm storing
> in base64
> format along with a SHA1 w/ RSA signature. How do I verify that
> signature against the signing certificate via
Hi,
I want to preface this by first saying that I know that this question is
probably pretty broad, but I'm hoping that someon on this list might be able to
help.
We are working with web services our SOAP messages have SAML assertions that
are digitally signed.
So, on the web service "client"
Hi All,
I am trying to build fips/openssl on aix 5.1. I have built fips, but
the tests are failing with the error:
if [ -n "libcrypto" ]; then ../util/shlib_wrap.sh
./fips_shatest < SHAmix.req | diff -w SHAmix.fax - ; fi
ERROR:24064064:lib=36,func=100,reason=100:file=md_rand.c:li
I spent some time in the debugger (yeah for open source) and figured out
what's going on. This is a follow up for others who may run into the
same issue.
The auto renegotiate code is handled only by the SSL BIO implementation,
not by the fd BIO implementation (which silently ignores the
BIO_set_ss
"Michael D. Adams" writes:
> On Thu, Oct 1, 2009 at 4:24 PM, Ger Hobbelt wrote:
>> A note about your mention of 'security leak': when you are worried
>> about adversaries who can run 'ps -l' on your machine, then you're
>> essentially worried about adversaries with plenty of access to your
>> ma
On Thu October 1 2009, Michael S. Zick wrote:
> On Thu October 1 2009, Michael D. Adams wrote:
> > On Thu, Oct 1, 2009 at 4:24 PM, Ger Hobbelt wrote:
> > > A note about your mention of 'security leak': when you are worried
> > > about adversaries who can run 'ps -l' on your machine, then you're
>
Thank-you for your thorough answer, Dave (and sorry for the top-posting
- I wanted to have your message preserved for Felix and Rajiv).
The ica maintainer (in cc) and I were discussing if there is some value
in aborting RSA_Generate_key() used by libica to generate keys.
Libica is a crypto li
(OT)
just kidding.
* Michael S. Zick wrote on Thu, Oct 01, 2009 at 16:44 -0500:
> Everbody in the same room should be sufficiently security qualified
> to see anything typed within that room.
cheating pupils in school exams probably won't agree, neither
will people who are writing love letter SM