Hello,
I'm sorry to repeat myself, but could anybody tell me how to store and
retrieve information in SecretBags of PKCS#12 files? I'm completely at a
loss in finding out the PKCS#12 API usage.
How can I store and retrieve information from/to SecretBags after
pkcs12_create()/pkcs12_parse()?
I've googled around for that and for a layman like myself I didn't find
anything that 'held my hand' through the process. If you know how to do
this could you elaborate on how to disable Diffie-Hellman key exchanges?
Thanks,
Mike Hoy
On Sun, Jul 8, 2012 at 3:33 PM, jb-open...@wisemo.com wrote:
Hello,
we're having some problems in verifying the time-stamps received from an
external supplier.
We are verifying the TSA reply with this command:
/usr/bin/openssl ts -verify -sha256 -untrusted CERT -CAfile CA -data
FILE TO MARK -in TSA REPLY
and the output we get is:
Hello,
we're having some problems in verifying the time-stamps received from an
external supplier.
We are verifying the TSA reply with this command:
/usr/bin/openssl ts -verify -sha256 -untrusted CERT -CAfile CA -data
FILE TO MARK -in TSA REPLY
and the output we get is:
On Mon, Jul 09, 2012, MauMau wrote:
Hello,
Please let me ask you for information and ideas about how to use
OpenSSL effectively to implement encryption for data storage.
I'm designing an encryption feature for a certain kind of data
management system. I want to implement the
Hello,
I read from man page of SSL_read:
==
If the underlying BIO is non-blocking, SSL_read() will also return when the
underlying BIO could not satisfy the needs of
SSL_read() to continue the operation. In this case a call to SSL_get_error(3)
with the return value of
When FIPS mode is turned on, I assume OpenSSL will only use FIPS 140-2
approved encryption algorithms for network traffic encryptions as well,
correct?
Alex
__
OpenSSL Project
From: Dr. Stephen Henson st...@openssl.org
On Mon, Jul 09, 2012, MauMau wrote:
[Questions]
Q1:
I want to encrypt the master encryption key with an
administrator-supplied password. I'm considering storing the
master encryption keys in SecretBag entries of a PKCS#12 file,
i.e. use one SecretBag
On 07/09/2012 04:12 PM, Alex Chen wrote:
When FIPS mode is turned on, I assume OpenSSL will only use FIPS 140-2
approved encryption algorithms for network traffic encryptions as well,
correct?
Yes, for the FIPS capable OpenSSL (OpenSSL 1.0.1 built using the
fips build-time config option with
Here's a series of commands:
git clone https://git.eff.org/public/observatory.git
cd observatory
# get the server response for twitter.com
./scan/FasterCertificateGrabber.py twitter.com
# split it into component PEM certs
./inspect twitter.com.results
cd certs
# now try to verify it. Note
Hrm, I've worked out why this was failing with 1.0.1c; the symlink for the
VeriSign Class 3 G5 root was missing from that repo's CApath. This doesn't
entirely explain why the same exact sequence of commands verifies
successfully on a machine with openssl 0.9.8o...
On 9 July 2012 16:59, Peter
From: owner-openssl-us...@openssl.org On Behalf Of Peter Eckersley
Sent: Monday, 09 July, 2012 19:59
# now try to verify it. Note that allcerts was a poorly chosen
directory name. It should have been allCAs...
openssl verify -untrusted twitter.com.results_2.pem
-CApath ../allcerts/
From: owner-openssl-us...@openssl.org On Behalf Of Sandro Tosi
Sent: Monday, 09 July, 2012 10:15
/usr/bin/openssl ts -verify -sha256 -untrusted CERT -CAfile
CA -data FILE TO MARK -in TSA REPLY
and the output we get is:
140119872083624:error:2F06D064:time stamp
From: owner-openssl-us...@openssl.org On Behalf Of Sebastian Raymond
Sent: Saturday, 07 July, 2012 05:31
I have set-up the apache2 on my linux machine. Everything worked fine
previously.
But now, when I try to use openssl s_client command to connect to
the machine, SSL handshake is
14 matches
Mail list logo