On Wed, Mar 10, 2010, Bin Lu wrote:
>
> Thanks Steve.
>
> Why the connection is still invalid, because subsequent OCSP_sendreq_bio()
> receives no response(while in blocking mode it does), after the 2nd time call
> to BIO_do_connect() in the loop which always returns 1/success ?
>
> It is fa
Ahmad Raif Mohamed Noor Beg wrote:
If we are talking about a PC which uses x86 hardware (Intel, AMD etc), yes with
the Gigahertz speed, using software will be faster than using hw accelerator,
in this case FPGA but the original question was I believe usage in an embedded
environment and using
If we are talking about a PC which uses x86 hardware (Intel, AMD etc), yes with
the Gigahertz speed, using software will be faster than using hw accelerator,
in this case FPGA but the original question was I believe usage in an embedded
environment and using ARM processor. Now using a hw accele
. wrote:
So we guess the main question is, if we design an AES cryptocore(FPGA)
how do we ensure that the cpu utilization will drop? This is more
important than getting a higher throughput
the hardest part will be getting data in and out of your engine faster
than the CPU can just process it
>> Hi,
>>
>> I have the following code snippet:
>>
>> bio = BIO_new_connect(host);
>> BIO_set_conn_port(bio, port);
>> BIO_set_nbio(bio, 1)
>> while (true) {
>> status = BIO_do_connect(bio);
>> if (status > 0 || !BIO_should_retry(bio)) {
>> break;
>> }
>>sleep(1);
>> }
>>
On Tue, Mar 09, 2010, Anand Giriraj wrote:
> Hi Folks,
> Would appreciate some responses for the questions below.
>
> Most importantly-
>
> I see the following note in
> http://www.openssl.org/docs/apps/pkcs8.html
> "The format of PKCS#8 DSA (and other) private keys is not well documented:
> it
On Tue, Mar 09, 2010, Bin Lu wrote:
> Hi,
>
> I have the following code snippet:
>
> bio = BIO_new_connect(host);
> BIO_set_conn_port(bio, port);
> BIO_set_nbio(bio, 1)
> while (true) {
> status = BIO_do_connect(bio);
> if (status > 0 || !BIO_should_retry(bio)) {
> break;
> }
Thanks Rafiq and Jason,
I did run the "openssl dgst -sha256 " command, and it didnt
complain ! So I know at least the simple sha-256 hashing operation is
supported in openssl 0.9.8g.
Just wasn't sure if it was also fully supported in the context of
certificate verification, etc. Sounds like
root [ ~ ]# openssl version
OpenSSL 0.9.8m 25 Feb 2010
root [ ~ ]#
I compiled and installed Openssl from source. I need to use Python with various
programs,that need md5. When the programs try the md5, they get errors. So what
I've done to try to narrow down the problem is go into Python and t
On Wed, Mar 10, 2010, . wrote:
> Hello everybody.
>
> We are two students doing a project about accelerating encryption on an
> embedded system. This system is build upon a ARM processor (180MHz) and an
> FPGA.
> We have built and implemented OpenSSH into the system (running Linux), and
> tested
> One specific advancement is the AES-specific instruction set in the 2010
> Intel Core™ processor family; an excerpt:
> Intel® AES instructions are a new set of instructions available beginning
> with the all new 2010 Intel® Core™ processor family based on the 32nm Intel®
> microarchitecture coden
On Wed, Mar 10, 2010, eoinmoon wrote:
>
> I then exported the private key [in java code], checked it was in PKCS8 form
> - See below
>
> "if (key instanceof PrivateKey && "PKCS#8".equals(key.getFormat())) {
> // Get certificate of public key
> keyOutput =
Hi,
I have searched the web for this answer and there are several suggestions on
how to do this , but my attempts have failed to convert an private
key[generated in java keystore and exported via java code] to a PEM format
which I need for my application.
These are the steps I have done:
Keytoo
Hi,
when I generate DH parameters with:
int bits = 1024;
DH *params = DH_generate_parameters (bits, DH_GENERATOR_5, NULL, NULL);
Can I then later read the value of the bits parameter from the DH struct?
Thanks
Dirk
__
OpenSSL Pr
On Wed March 10 2010, . wrote:
> Hello everybody.
>
> We are two students doing a project about accelerating encryption on an
> embedded system. This system is build upon a ARM processor (180MHz) and an
> FPGA.
> We have built and implemented OpenSSH into the system (running Linux), and
> tested t
On Tue March 9 2010, Lou Picciano wrote:
> Luis,
>
>
> I feel your pain. We were also recently working through the decision tree on
> purchasing 'purpose-specific' encryption hardware for our servers; we were
> talked out of it by people on this list and elsewhere, given advances in
> CPUs.
I'm trying to figure out if my openssl based applications are vulnerable
to CVE 2009-3245
From: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3245
> OpenSSL before 0.9.8m does not check for a NULL return value from
> bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2)
> crypto/bn/b
Hello everybody.
We are two students doing a project about accelerating encryption on an
embedded system. This system is build upon a ARM processor (180MHz) and an
FPGA.
We have built and implemented OpenSSH into the system (running Linux), and
tested the AES encryption in software.
The task is no
I am actually trying to compile Firefox from the source. Firefox want me to
first make xulrunner. during that compile I get :
File "/usr/lib/python2.6/hashlib.py", line 63, in __get_builtin_constructor
import _md5
I reinstalled opensll and Python. Still the same error. I think I've traced t
Hi Folks,
Would appreciate some responses for the questions below.
Most importantly-
I see the following note in
http://www.openssl.org/docs/apps/pkcs8.html
"The format of PKCS#8 DSA (and other) private keys is not well documented:
it is hidden away in PKCS#11 v2.01, section 11.9. OpenSSL's defau
20 matches
Mail list logo