Hi,
This is to know further about implementation of PBKDF2,
PKCS5_PBKDF2_HMAC.
1. Would like to know the maximum salt length allowed.
2. Usage of hash function SHA256 with above function.
3. Which source code file implements the above function.
4. Please provide re
Hello,
I'm beginning with TSA and I'm wondering if it is possible to validate
a timestamp request against a unique (self signed) certificate.
Now I can do :
$ openssl ts -verify -queryfile file.tsq -in file.tsr -CAfile
demoCA/cacert.pem -untrusted demoCA/tsacert.pem
I add the 'cacert.pem' cer
Hi,
Ryan Hurst wrote:
> They are doing a CA signed OCSP response, this is legitimate.
>
> We will do this in the not so distant future as well for many of our
> responses also.
If this is called "CA signed OCSP response", how is *your* current
response, which you will change in future, called?
Hi,
forget it - I got it :)
"-VAfile level1.crt" is doing 'the trick'.
But I still don't now how to compute/get the responseID on my own.
Thanks.
--
Regards,
Igor
__
OpenSSL Project http://www
CA delegated.
Ryan Hurst
Chief Technology Officer
GMO Globalsign
twitter: @rmhrisk
email: ryan.hu...@globalsign.com
phone: 206-650-7926
Sent from my phone, please forgive the brevity.
On Jun 13, 2013, at 3:42 AM, Igor Sverkos wrote:
> Hi,
>
> Ryan Hurst wrote:
>> They are doing a CA signed O
On 6/12/2013 11:35 PM, Matt Caswell wrote:
On 12 June 2013 21:15, Jakob Bohm wrote:
As for the DH_check_pub_key() function, checking if pubkey is in the
range "two to large prime minus 2, inclusive" is an insufficient check
against accepting degenerate keys. For instance NIST SP 800-56A
requ