Hi,
I tried to use openssl command to generate an HMAC with a key
contains '\0', but failed.
openssl dgst -sha1 -hmac `cat key-file` input-file
I'm happy if dgst command supports binary format like enc command.
So I appended -hmachex key in hex option as the followings:
openssl dgst -sha1
Hell,I've got a question regarding self-signed X509v3 certificates used in a TLS1.0 server/client environment. A communication partner uses a self-signed certificate as attached to this mail (can be retrieved from the TLS server87.236.105.37:6619). My TLS client uses the following options:
Hi,
Is there a way in which I can determine the correct issuer certificate of
an issued certificate(either intermediate CA or end entity) based on
comparing immediate pair alone.
Eg:
My hierarchy is like this:
Root
Intermediate CA 1
Intermediate CA 2
End entity
Is it possible to determine that
On 8/2/2012 10:04 AM, Ashok C wrote:
Hi,
Is there a way in which I can determine the correct issuer certificate
of an issued certificate(either intermediate CA or end entity) based
on comparing immediate pair alone.
Eg:
My hierarchy is like this:
Root
Intermediate CA 1
Intermediate CA 2
End
On Thu, Aug 02, 2012, Ashok C wrote:
Hi,
Is there a way in which I can determine the correct issuer certificate of
an issued certificate(either intermediate CA or end entity) based on
comparing immediate pair alone.
Eg:
My hierarchy is like this:
Root
Intermediate CA 1
Intermediate
On Thu, Aug 02, 2012, MITSUNARI Shigeo wrote:
Hi,
I tried to use openssl command to generate an HMAC with a key
contains '\0', but failed.
openssl dgst -sha1 -hmac `cat key-file` input-file
I'm happy if dgst command supports binary format like enc command.
So I appended -hmachex key in
Hi,
You can achieve this using the generalised MAC interface to HMAC like this:
openssl dgst -sha1 -mac HMAC -macopt hexkey:aabbcc
I'm ashamed of my mail. Thank you for your advice.
Yours,
Shigeo
__
OpenSSL Project
From: owner-openssl-us...@openssl.org On Behalf Of Erik Tkal
Sent: Wednesday, 01 August, 2012 16:33
I'm playing around to see if I can observe client and server
under various conditions when negotiating TLS 1.2 with newer
certs. I created a root and server cert as ecdsa-with-SHA256.
From: owner-openssl-us...@openssl.org On Behalf Of Harald Latzko
Sent: Thursday, 02 August, 2012 03:03
snip self-signed certificate as attached to this mail (can be retrieved
from the TLS server 87.236.105.37:6619). My TLS client uses the
following options:
SSL_CTX_load_verify_locations(ctx,
Thank you Jacob and Stephen.
That brings one more question which was posted by Klaus sometime back:
Hi!
I wrote a small program which dumps all root certificates from Windows
certificate store into a file. Then I use openssl to connect to Google and
validate its certificate:
openssl s_client
10 matches
Mail list logo