Re: [openssl-users] openssl verify with 1B certificates

2017-03-30 Thread Richard Moore
Depends what information you need - if you just need a binary valid/not valid then prune it first then verify. If you want a more fine grained data set then don't. Write some code - forking and running openssl verify each time will be insanely slow - don't do that. I doubt you really have a

[openssl-users] openssl verify with 1B certificates

2017-03-30 Thread ebe ebe
Hello, I am a CS graduate student and doing a measurement study regarding the SSL ecosystem. I have approximately 1 billion SSL certificates and I would like to run openssl verify on each certificate to sift out invalid certificates. My major concern, as you might guess, is whether doing this

Re: [openssl-users] https using OpenSSL for embedded device and java server

2017-03-30 Thread Michael Wojcik
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of > Sarvesh Renghe > Sent: Wednesday, March 29, 2017 07:32 > Now we want to send this data from modem to server in a secured way. Once > option is to encrypt the data using > RSAEncyptor before sending and decrypt the

Re: [openssl-users] Certificate path validation.

2017-03-30 Thread murugesh pitchaiah
Hi, To find CA or not, "X509_check_ca" may be used. Thanks, Murugesh P. On 3/29/17, Richard Stanek wrote: > static bool IsCACertificate(X509* cert) > { > // (U) Initialize to false. > bool bRetVal = false; > >