2 bytes (again,
> larger if it's encrypted). (I'm verifying these figures right now; I
> figure it'll take about as long to generate a 16384-bit key today on
> my Core2 Duo 2.16GHz as it did to generate a 1024-bit PGP key on a
> 386DX 20MHz in 1995.)
>
> -Kyle H
>
HI All
Is there be an upper limit on the size of a x509 certificate file in
PEM format? Suppose that I am using 4096 bit key.
Is there a way to calculate such length.
Similarly is there an upper limit on the size of PEM format private
key file? I am using 4096bit key.
Thank you
--Satish
>
> On Wed, Jun 17, 2009 at 10:50 AM, Satish Chandra
> Kilaru wrote:
>> Hi
>>
>> In the following sample certificate, there is a tun of information
>> before --BEGIN CERTIFICATE--.
>> Who is this for? Is it for a human reader to make sense of who/
Hi
In the following sample certificate, there is a tun of information
before --BEGIN CERTIFICATE--.
Who is this for? Is it for a human reader to make sense of who/what
this certificate is certifying? If it is for a s/w program that uses
certificates, how is this information supposed to be used?
T
Hi All
If neither the client application nor the server application is
calling SSL_renegotiate(), can SSL Renegotiation get triggered on its
own? am using non-blocking socket directly. I am not using any BIO
for Socket I/O.
--Satish
___
:-)
On Thu, Jun 11, 2009 at 4:02 AM, Erwann
ABALEA wrote:
> Hodie IV Id. Iun. MMIX, Satish Chandra Kilaru scripsit:
>> I found relevant information in RFC 3280. I recommend referring to
>> that RFC for any questions like mine.
>> http://www.ietf.org/rfc/rfc3280.txt
>
&g
I found relevant information in RFC 3280. I recommend referring to
that RFC for any questions like mine.
http://www.ietf.org/rfc/rfc3280.txt
--Satish
On Wed, Jun 10, 2009 at 5:34 PM, Satish Chandra
Kilaru wrote:
> HI All
>
> What is NID_subject_key_identifier? And when do I want
HI All
What is NID_subject_key_identifier? And when do I want to add an
extension with this NID to a x509 certificate?
--Satish
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
Hi All
I have certificate and private key in a buffer (not in a file). How do
I pass on these to OpenSSL with out storing in a temp file? In other
words are there any APIs that take certificate from a buffer instead
of a file?
I could only find APIs that expect a file argument or X509* or ASN1
bu
; unless you add CA1 to the client's trust store), but yes, you can
> SSL_clear() to make the socket reusable.
>
> -Kyle H
>
> On Mon, Jun 8, 2009 at 7:40 AM, Satish Chandra
> Kilaru wrote:
>> Hi
>>
>> I am developing SSL client and server programs. These
Hi
I am developing SSL client and server programs. These are NOT general
purpose SSL client and server programs.
At the beginning of the world they will have a CA1 and certificates
signed by CA1.
After some time, client is is configured with a new CA called CA2.
Now client is trying to connect t
11 matches
Mail list logo