est regards.
Paolo
- Original Message -----
From:
Bruce Cartland
To: [EMAIL PROTECTED]
Sent: Thursday, November 07, 2002 11:27
AM
Subject: PKCS#11 and the Schlumberger
smartcard
I am using PKCS#11 libraries supplied by
vendors (although
I 100% agree with you all. This is the attitude I've taken with the legals
too. ie. it's laughable. I would have ignored it all and not bothered anyone
with it except I'm getting the 'this is serious' response and it's causing a
real stir. I'm also not getting any hard facts from them. Since noone
t; <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Friday, November 08, 2002 7:01 PM
Subject: Re: DevTECH Industries To Start Multi-billion $ Class Action
Against Software Development Firms
> In message <000f01c286e5$1659c590$0c00a8c0@bclaptop>
Anyone know anything about this? I've tried the web site
but there's nothing there. It's all somewhat unbelievable.
Not that not acknowledging use of OpenSource isn't bad
karma. But is this a hoax? If not, why doesn't OpenSSL have
something on the we
I am using PKCS#11 libraries supplied by vendors
(although I'm starting to look at openCryptoki) to generate oncard keypairs and
sign data for authentication (non cert based).
However, when I then run the
resulting signature through OpenSSL 0.9.6 RSA_public_decrypt() with padding type
of R
the same cryptoprocessor
> as the one used in this card... Am I right? ;-)
>
> On Sat, 17 Mar 2001, bruce cartland wrote:
>
> > My thanks to Steve Henson and Steve Reddie,
> >
> > I have got it working. As I'm working at the ADPU level of the card the
> >
gn operation
> will be being performed with PKCS#1 padding, and so you will need to use
the
> same padding mode during verification.
> Steven
> --
> Steven Reddie <[EMAIL PROTECTED]>
> Senior Software Engineer
> Computer Associates Pty Ltd (Australia)
>
>
> >
e
>
>
>
> ::-Original Message-
> ::From: [EMAIL PROTECTED]
> ::[mailto:[EMAIL PROTECTED]]On Behalf Of bruce cartland
> ::Sent: Saturday, March 10, 2001 2:58 AM
> ::To: [EMAIL PROTECTED]
> ::Subject: Re: Client certificates: Key store per workstation, not per
> ::u
y on all organizations
> > having roaming profiles, where all users would have access to the
> > certificate without depending on the location.
> >
> > The question is the CertStore. To reduce the administrative burden, only
> one
> > certificate per workstation would suffice. Kind o
I have n (the public modulus) and e (the public exponent). No nicely
encoded data. Given those two values is there an API set to construct the
RSA (public key) structure? I'm guessing I'd have to create a BIGNUM first
then ..? Nothing obvious in rsa.h. Would it be reasonable to create a new
RSA s
10 matches
Mail list logo