Hi,
I want to know which encrypted private key formats can be used with the
following function in FIPS mode:
SSL_CTX_use_PrivateKey_file()
It seems that the OpenSSL proprietary format for storing private keys (
which has a header like this
-BEGIN RSA PRIVATE KEY-
Proc-Type: 4,ENCRYPTED
Hi All
Thank you so much for all the response.
I have one more doubt. If we do normal proxying on https connection, is
it possible to read the https content data, at least the URL
Thanks, Raj Rajmohan SK
- Original Message -
From: "David Schwartz"
To:
Sent: Wednesday, July 28
The OpenSSL development team typically don't comment on a request until
they've fixed it. (I believe this is "poor customer service", but I
also believe that I'm not entitled to "good customer service" until I've
paid for it.)
What appears to happen is this:
1) bug submitter sends an email to r
Thanks for the information about the rt address. We sent the
explanation and patch as you suggested, and can now see the issue on
the tracker list. However, no one has commented on it. Are there
additional steps we can take to further the process of accepting the
patch?
Thanks!
Jake Goulding | So
Rene Hollan:
> Oh! I totally misunderstood this.
> I thought OP wanted to MITM SSL sessions (which is possible, if
> (a) the traffic is decrypted, (b) certs are reissued and resigned,
> and (c) the client TRUSTS the modified cert chain (typically its
> root cert)).
> This is just HTTPS Proxy. In
Oh! I totally misunderstood this. I thought OP wanted to MITM SSL sessions
(which is possible, if (a) the traffic is decrypted, (b) certs are reissued and
resigned, and (c) the client TRUSTS the modified cert chain (typically its root
cert)).
This is just HTTPS Proxy. In which case other answer
I am working on a project for which we plan to use the FIPS object
module and AES 256. While I expect that a software-only
implementation will work fine, I would like to know the feasibility
of using an external device through the "engine" interface to satisfy
the FIPS 140-2 Level 3 physical s
Alexey Drozdov wrote:
> Hi!
>
> When your setup proxy setting for browsers, they using HTTP CONNECT
> method for establish pure tcp-connection via proxy (not for local
> resources).
> It's seems like:
>
> Client send HTTP-request to proxy
> CONNECT remotehost:port HTTP/1.1
> Host: re
Hi!
When your setup proxy setting for browsers, they using HTTP CONNECT method for
establish pure tcp-connection via proxy (not for local resources).
It's seems like:
Client send HTTP-request to proxy
CONNECT remotehost:port HTTP/1.1
Host: remotehost:port
And begin wait HTTP-res
@Steve: Yeah you are right; But for net-snmp version 5.4.2.1 the only thing I
need is just HMAC,SHA and MD5;
Is there much difference in the compiled libaries anyway? When i did some
comparison the difference was in the 100kB area. Thats not to much;
BTW: I found a link to what seems to be a w
10 matches
Mail list logo