On Fri, Oct 7, 2011 at 7:40 PM, Kristen J. Webb kw...@teradactyl.com wrote:
My understanding is that a TLS connection with a server cert
only identifies the server to the client. This leads to a MiTM
attack, where the mitm can impersonate the client because the server
has not verified the
Hello All,
I want to use OpenSSL for the application that i am writing. Could someone
direct me what is the best starting point. I tried Google but failed to find
any examples.
PS: I hope i am posting on the right forum.
-Thanks
mithun
Hi Richard,
Thanks for the reply, I did some research and found that there is an openssl
patch which can get me this option, I tried it in my lab and it works also.
Here is the location of patch
Hi all,
This week i was in doubt to implemment some methods to sign using OpenSSL. I
know that RSA needs the hash algorithm to do the padding scheme and ECDSA
doesn't need.
Another thing that i know is that RSA can only sign things that are smaller
than the size of the key used. I can imagine
On Sat, Oct 8, 2011 at 6:39 AM, Rick Lopes de Souza
dragonde...@gmail.com wrote:
Another thing that i know is that RSA can only sign things that are smaller
than the size of the key used.
No - you can sign a message of arbitrary length - a suitable message
digest is what is encrypted (well,
On Fri, Oct 7, 2011 at 1:55 PM, Diffenderfer, Randy
randy.diffender...@hp.com wrote:
How worried should I be about the contents of this?
http://www.kb.cert.org/vuls/id/864643 (published 2011-9-27)
Is this the topic that flitted across the board a week or so ago?
SSL_OP_ALL includes
From: Mithun Kumar
Sent: Friday, October 07, 2011 5:54 PM
Hello All,
I want to use OpenSSL for the application that i am writing. Could someone
direct me what is the best starting point. I tried Google but failed to find
any examples.
PS: I hope i am posting on the right forum.
-Thanks