On 3/31/2010 4:21 PM, Gatewood (Woody) Green wrote:
>
> Actually, no 140-3 will be successor to 140-2 which is successor to
> 140-1. The hyphenated number is a release version.
Woody, thanks for this clarification...
> You are trying to talk about FIPS 140-2, Level 3 certification in your
> exa
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
William A. Rowe Jr. wrote on 03/31/2010 01:20 AM:
> On 3/30/2010 10:58 AM, Gatewood (Woody) Green wrote:
>>
>> I assume the 2010 limit on new validations is the impending finalization
>> of 140-3.
>
> What you are thinking of won't be designated
Hello, I have my public key stored in a card. Using opensc I get the public key
from my certificate.I'm doing a C program and I have the key in a EVP_PKEY
structure but i need pass the key to a string or file
Any idea?
Thanks
__
I am trying to to use ftps for secure server. We have two identical
client trying to connect to the server.Client 1 can connect but not
client 2. Client 2 throws below error
error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag
Openssl on both clients
openssl-0.9.7a-43.1
xmlsec
Sorry if this has been ask before.
I need to use 'wget' to do a secure file download. It works great at
the command line. Unfortunately wget asks for the PEM passphrase.
However this will eventually be part of an embedded application so the
passphrase prompt can't happen.
1. Can you create PEM's
On Wed, Mar 31, 2010, Anthony Gabrielson wrote:
>
> Hello,
>
> I'm actually writing a Matlab toolbox that uses OpenSSL. I put together a
> function, actually its really heavily based on the OpenSSL book, that
> generates random keys and IV. Anyway, I wasn't comfortable with how I was
> seeding
- Original Message -
From: "Dr. Stephen Henson"
To: openssl-users@openssl.org
Sent: Wednesday, March 31, 2010 7:43:06 AM GMT -05:00 US/Canada Eastern
Subject: Re: Random Numbers
You can use RAND_bytes() on Windows and the OpenSSL PRNG will be automatically
seeded from various sour
On Tue, Mar 30, 2010, Anthony Gabrielson wrote:
> Hello,
>
> I've been searching around and I'm not finding much on
> OpenSSL and random numbers. I'm trying to figure out how to best use
> RAND_bytes and RAND_pseudo_bytes; do I still need to worry about entropy or
> does OpenSSL
On 3/30/2010 10:58 AM, Gatewood (Woody) Green wrote:
>
> I assume the 2010 limit on new validations is the impending finalization
> of 140-3.
What you are thinking of won't be designated 140-3, it's not sequential,
there is such a FIPS level already. Probably FIPS-{new}-2 or FIPS-140-2 2010
or s
On Tue, Mar 30, 2010 at 11:48 PM, P Kamath wrote:
> I said it is an RNG, not cryptographic RNG. By adding current time source,
> however crude, and doing a sha1/md5, why should it not be cryptoPRNG? What
> properties should I look for?
Taking a hash of an entirely predictable (or narrowly bo
P Kamath wrote:
> I said it is an RNG, not cryptographic RNG. By adding current time
> source,
> however crude, and doing a sha1/md5, why should it not be cryptoPRNG?
> What
> properties should I look for?
You should look for a cryptographically-secure random number generator.
Seriously, you sh
On Tue, Mar 30, 2010 at 12:14 PM, Kyle Hamilton wrote:
> That's your shell talking. Try:
>
> openssl ciphers -v 'HIGH:!RSA'# note the single-quotes
>
> You just have to tell the shell not to interpret the bang, by quoting
> it -- either with a backslash or in an uninterpreted-quoted string.
12 matches
Mail list logo