I recently ran into a bug with verification of OCSP responses that appears to
be in all versions of OpenSSL (including current 1.1.0 builds).
RFC 6960 and its predecessor 2560 allow that the response may be signed by the
key for "the CA who issued the certificate in question” (section 2.2). In
Hi, all:
When I specify "user_debug=31" in kernel cmdline, I get undefined
instruction error.
And I figured it out that PC pointed at "mrc p15,0,r0,c9,c13,0". I know this
instruction is used
to get CPU tick. Unless PMUSERENR(Performance Monitors User Enable Register) is
set,
this
Hi Jay,
Thanks for your reply.
Our requirement is as follows
1. only using openssl for authenticaion and a key wrap algorithm. No
encryption is needed.
2. For MAC alogorithm, we need to use M_SHA1 / M_SHA256
For key wrap algo, we need to use AES 128 or AES 256 algo.
Following are the steps we
Hi Jay,
Thanks for your reply.
Our requirement is as follows
1. only using openssl for authenticaion and a key wrap algorithm. No
encryption is needed.
2. For MAC alogorithm, we need to use M_SHA1 / M_SHA256
For key wrap algo, we need to use AES 128 or AES 256 algo.
Following are the steps