I am facing the same issue. I want to automate adding of CA certificate to
the client machine.
Where can I get this CA.sh? Will it automate client process of adding the CA
certificate as trusted one? I found CA.pl, a wrapper script by Eric. Is it
the same you are talking of?
On Fri, Jun 13, 2008 a
Nobody has anything to share? Atleast do you know how hard it is do debug
the optimized code, if possible?
On Tue, Jun 10, 2008 at 5:07 PM, Ace <[EMAIL PROTECTED]> wrote:
> Hi,
>
> I am using OpenSSL 9.8a. *Is it advised to compile OpenSSL with
> highest optimization level
Can someone guide me on this?
On Tue, Jun 10, 2008 at 5:07 PM, Ace <[EMAIL PROTECTED]> wrote:
> Hi,
>
> I am using OpenSSL 9.8a. *Is it advised to compile OpenSSL with
> highest optimization level?* The reason I am asking is following note in
> PROBLEMS docum
Hi,
I am using OpenSSL 9.8a. *Is it advised to compile OpenSSL with highest
optimization level?* The reason I am asking is following note in PROBLEMS
document in OpenSSL source distribution -
"According to a problem report, there are bugs in gcc 3.0 that are
triggered by some of the code in O
<
[EMAIL PROTECTED]> wrote:
> On Thu, Jun 05, 2008 at 10:28:28PM -0700, Ace wrote:
>
> > PKI Handshakes are always the cause of worry when it comes to performance
> > but now I am facing problems even with the normal encryption. The data
> size
> > is around 2k. Woud
t; On Thu, Jun 05, 2008 at 08:20:31PM -0700, Ace wrote:
>
> > I know that DHE-RSA-AES256-SHA is more secure than RC4-SHA
>
> The DHE part especially, as it yields forward-secrecy. So far, RC4
> with fully random keys has held up reasonably well.
>
> > but it needs
>
Hi,
I know that DHE-RSA-AES256-SHA is more secure than RC4-SHA but it needs
more computation power and RC4-MD5 is faster. I saw the mixed response on
RC4-MD5 usage. OpenSSL lists it as medium strength cipher but I found that
many people have listed attacks on this, possible in an hour. What i