> From: owner-openssl-us...@openssl.org On Behalf Of Sam Jantz
> Sent: Friday, 10 September, 2010 16:42
> It's actually a mix of a couple of hashes. Specifically
> md5, and sha1 according to the spec.
> The best place to look for this would be [RFC2246]
That's k
It's actually a mix of a couple of hashes. Specifically md5, and sha1
according to the spec.
The best place to look for this would be the standard RFC document since
OpenSSL complies to that. The TLSv1 RFC (linked here:
http://www.ietf.org/rfc/rfc2246.txt) contains how the key material is
genera
> From: owner-openssl-us...@openssl.org On Behalf Of krishnamurthy
santhanam
> Sent: Friday, 10 September, 2010 05:51
> I really thanks for all your inputs and suggestions, I
> have not pasted fully last time all the output...below is the output
> > rsa = R
> From: owner-openssl-us...@openssl.org On Behalf Of Stephan Müller
> Sent: Friday, 10 September, 2010 14:58
> i am wondering how key derivation in openssl works, I got
>
> > > openssl enc -des -P -k 'admin' -nosalt
> key=21232F297A57A5A7
> iv =43894A0E4A801FC3
>
> as far i understand the docume
Hello Peter!
(You're covering a few things at the same time there...)
First off, there would normally be no problem at all running two discrete
instances of Apache on the same machine, given that they'll be on separate
ports. This is, of course, limited by constraints of the server's resour
Hello,
i am wondering how key derivation in openssl works, I got
> > openssl enc -des -P -k 'admin' -nosalt
key=21232F297A57A5A7
iv =43894A0E4A801FC3
as far i understand the documentation, in this setting the key and iv are
just taken from
md5(admin)=456b7016a916a4b178dd72b947c152b7
but obviou
Hello, this is my first post to the list.
I currently have 0.9.6e installed on a Solaris 9 system running apache
1.3.27, serving the world on port 80. Yes, old setup... and the reason
why I am here.
My goal is to get Apache 2.2.16 up and running on port 81 with
php/mysql/openssl for develop
And, to further this point, OpenSSL can handle PKCS#10 in either PEM or DER
format, as well as SPKAC.
Have fun.
Patrick.
On 2010-09-10, at 4:59 AM, sandeep kiran p wrote:
> You can use what ever file extensions you may want but the contents of the
> file should be a PKCS#10 structure. File e
Thanks Dave,
I really thanks for all your inputs and suggestions, I have not pasted fully
last time all the output...below is the output
> rsa = RSA_generate_key(2048, 3, NULL, NULL);
> size = i2d_RSAPublicKey(rsa, &iend);
> /* size returns the size of public key in bytes */
>
You can use what ever file extensions you may want but the contents of the
file should be a PKCS#10 structure. File extensions should not matter.
-Sandeep
On Fri, Sep 10, 2010 at 10:58 AM, prasanth wrote:
> Hi,
>
> what are the file extention formats like PEM, CSR ,P10 .. that can be
> signed b
hi!
is it possible to extracht from a signed mime-message just the signature?
i will parse it with asn1parse, but this needs just the signature as far
i figured out. if i give it the whole message it struggles.
or how is it possible to pass a whole signed message to asn1parse?
thanks for hel
11 matches
Mail list logo