In message <329575d84ff8c598faadec8736a634b318ffb814.ca...@mad-scientist.net>
on Tue, 18 Dec 2018 20:54:30 -0500, Paul Smith said:
> Hi all; I'm working with OpenSSL 1.1.1a, using the EVP interface to
> encrypt/decrypt with various ciphers/modes.
>
> I had a couple of questions:
>
>
> First,
On Wed, 2018-12-19 at 08:57 +0300, Dmitry Belyavsky wrote:
> > I would have thought that the true maximum would be round-up(inl,
> > cipher_block_size); that is, for inl values 1-15 you'd get 16
> > bytes, and for inl values 16-31 you'd get 32 bytes, etc. (I'm not
> > actually sure whether inl of 1
Hello Paul,
On Wed, Dec 19, 2018 at 6:02 AM Paul Smith wrote:
> Hi all; I'm working with OpenSSL 1.1.1a, using the EVP interface to
> encrypt/decrypt with various ciphers/modes.
>
> I had a couple of questions:
>
>
> First, the encrypt update docs say:
>
> > the amount of data written may be any
Hi all; I'm working with OpenSSL 1.1.1a, using the EVP interface to
encrypt/decrypt with various ciphers/modes.
I had a couple of questions:
First, the encrypt update docs say:
> the amount of data written may be anything from zero bytes to
> (inl + cipher_block_size - 1)
Is that really true?
Hello Dragan,
there is currently no way to display information you require with openssl's
TS command. However it is pretty easy to write custom application and use
openssl library to parse time-stamp response.
OpenSSL's TS module currently signs timestamps only with "sha1-rsa"
algorithm, but few
Dear all
I have two questions:
1. How can I extract TSA certificate and CA certificate(s) from a time stamp
response, using OpenSSL TSA Tool?
2. How can I print signature algorithm (SHA1-RSA, SHA256-RSA,
SHA512-RSA,...) from the time stamp response/token in human-readable format?
Thanks in
Dear OpneSSL support team
Could you please answer to my questions:
1. What process occurs when we revoke the certificate with the command: openssl
ca -revoke
2. Why openssl software allows to one Certification Authority(CA) to revoke
certificate signed by another CA.
Thank you in advance
Best re
Dear people,
1. I seem to remember that you could place an "include" statement
in de openssl.cnf file. I wonder if I am mistaken, since that
does not work.
2. Secondly, is there a proper description of the contents of the
openssl.cnf file, especially with the spec
Dear people,
1. I seem to remember that you could place an "include" statement
in de openssl.cnf file. I wonder if I am mistaken, since that
does not work.
2. Secondly, is there a proper description of the contents of the
openssl.cnf file, especially with the spec
Duncan Taylor wrote:
>
> My first question:
> HOW do I parse out a recipient's .pfx cert or .p12 cert to pem
> format? I have scoured the documentation High and Low and find
> NOTHING but examples of "since I have MY .pem we'll use that for the
> signer and reciep.." or how to parse one's p
"Scheltema, R.A." <[EMAIL PROTECTED]>:
> 1. Now I think the previous calls do not place a signature on the data (at
> least I hope not). My question is how do I place a signature on something (I
> know I need my own private key to do this). I have an array of chars. Which
> calls do I have to mak
Hi all,
I have written a server and a client using OpenSSL in c++. I'm able to
communicate between the two using the calls SSL_write and SSL_read, which
encrypt and decrypt the data. Now I'm faced with two questions:
1. Now I think the previous calls do not place a signature on th
12 matches
Mail list logo