On Tuesday 01. October 2013 02:56:16 you wrote:
Hi,
I am very new to OpenSSL.
I would like to understand how exactly CRL is used.
Means, lets say, we try to login using gmail.com in any browser. Now we see
certificates - We see Google Inc is the 1st level and it has a CRL which is
Just a wild guess: If you click on edit trust on the root certificate in
Firefox, you have to tick the box for web server certificates.
cheers
Mat
On Friday 04. October 2013 21:29:57 you wrote:
Hello,
there exists a self signed root CA certificate (A)
one intermediate CA certificate (B)
Hello,
I'm using openSSL on a low-end embedded processor: an Intel Atom running at
1.1Ghz.Using SSL divides down my transfer speed by two so I try to figure out
how I can improve performance.
For information I'm using 1.0.1e release, recompiled for Win32 (my embedded
system uses an XP embedded)
Hi,I am a newbie to openssl, I do have a question related to client
hello/server hello authentication flow in openssl.I have to use
pre-available fingerprint to verify the server certificate during TLS
connection establishment.Is there any way/mechanism in openssl to verify
certificate against
Are you sure that the key exchange is not a factor? Have you measured SSL
setup times compared to post-setup transfer times?
4K RSA is computationally expensive. Are you sure that the rest of your system
is secure enough to justify that instead of 2K RSA?
/r$
--
Principal
From: owner-openssl-us...@openssl.org On Behalf Of nvharisha
Sent: Tuesday, October 01, 2013 05:56
I would like to understand how exactly CRL is used.
Means, lets say, we try to login using gmail.com in any browser. Now we
see
certificates - We see Google Inc is the 1st level and it has a
On 7 October 2013 19:39, Dave Thompson dthomp...@prinpay.com wrote:
You don’t need to change OpenSSL to do what you say you want; just create an
EC_KEY with the curve,
set the desired private key value, and do a point multiplication to get the
public key value and set that.
This is
RSA key size only affects handshake, and should be costly client side only if
using client-auth; are you?
Data handling speed will normally be affected by encryption *and* MAC (usually
HMAC).
You could certainly try different data (symmetric) cipher, such as 3DES or RC4.
I don’t know