Hi
Yep I have tried the output to text. but does that verify the signature.
So what I think I have now is
my data to be signed
I make a request
send the request to the tsa
the tsa signs it adds signature
I have response.
Now I need to verify it
openssl ts -verify -data SHA.sha -in SHA.sha.tsr
The page you looked at says "master manpages" in bold at the top of the
right hand column with "1.0.2 version" as one of the links for several
different versions below. The URL you gave includes "manmaster" where
the one you needed has "man1.0.2". It seems clear to me, though I
suppose the use
All,
Apologies in advance if this is the wrong mailing list to send this to.
Looking for some guidance on correctly setting the openSSL cipherstring for TLS
operation in FIPS mode.
The openSSL wiki page "FIPS mode and TLS" and the cipherstring configuration
for openSSL appear to be out of date
On 04/08/2016 03:31 AM, Ken Chow wrote:
> Dear all,
>
> I am trying to compile a sample for testing openssl FIP mode, I have
> successfully compiled executable file in ubuntu 14.04.
>
> *Sample:*
> /* test.c */
> #include
> #include
> #include
> #include
>
> int main()
> {
> #ifdef OPENSSL_F
Hi,
The "length" field of dh_st structure defined in "dh.h" file is removed
in BoringSSL. I am porting my application for BoringSSL but is giving this
error.
Also in dh.h field this field is mentioned as optional.
Could you please suggest what is the relevance of this field and what
impact do
Hi,
The "length" field of dh_st structure defined in "dh.h" file is removed
in BoringSSL. I am porting my application for BoringSSL but is giving this
error.
Also in dh.h field this field is mentioned as optional.
Could you please suggest what is the relevance of this field and what impact
do
Can anyone help me here?
Thanks
Sandeep
On Wed, Apr 6, 2016 at 6:34 PM, sandeep kiran p
wrote:
> Hi,
>
> Ours is a TLS proxy component where we act as MITM for certain traffic
> between clients and servers for analysis. We recently migrated from 1.0.1q
> to 1.0.2g after which we are seeing freq
Hello Viktor,
from what I can see there is no number wether in the URL nor on the page
itself, that shows this docu is meant for the upcoming version 1.1.0.
Though it's clear now.
Thanks a lot for the hint!
Cheers
Markus
-Ursprüngliche Nachricht-
Von: openssl-users [mailto:openssl-user
Dear all,
I am trying to compile a sample for testing openssl FIP mode, I have
successfully compiled executable file in ubuntu 14.04.
*Sample:*
/* test.c */
#include
#include
#include
#include
int main()
{
#ifdef OPENSSL_FIPS
if(!FIPS_mode_set(1))
{
fprintf(stderr, "MSG: \n")
> On Apr 8, 2016, at 2:52 AM, Markus Reusch wrote:
>
> I am in search of the –proxy option for s_client. According to
> https://www.openssl.org/docs/manmaster/apps/s_client.html it should be
> implemented
That's the documentation for the upcoming 1.1.0 release. The related
1.0.2 document is:
Hello all,
I am in search of the -proxy option for s_client. According to
https://www.openssl.org/docs/manmaster/apps/s_client.html it should be
implemented, but when compiling the latest stable version 1.0.2g I just get the
message, that -proxy for s_client is an unknown option.
Searching all
11 matches
Mail list logo