[openssl-dev] digest SN_ecdsa_with_SHA256 and NID_ecdsa_with_SHA256
On 26/04/16 10:39, Gäckler Martin (EXT) wrote:
> Hi Matt,
>
> Thanks for the reply. According to my colleague the PHP function
> opens_verify uses EVP_get_digestbyname to retrieve the EVP_MD. This
> does not w
al Message-
From: openssl-dev [mailto:openssl-dev-boun...@openssl.org] On Behalf Of Matt
Caswell
Sent: Dienstag, 26. April 2016 11:12
To: openssl-dev@openssl.org
Subject: Re: [openssl-dev] digest SN_ecdsa_with_SHA256 and NID_ecdsa_with_SHA256
On 26/04/16 09:43, Gäckler Martin (EXT) wrot
Hello,
We're currently developing a system that uses OAuth protocol to identify the
users. The service provider is developed in PHP and uses OpenSSL to verify the
access token. Unfortunately the identity provider, which is managed by another
company, uses ecdsa with sha256 to sign the access to
des and is unavailable
from time-to-time.)
> -Original Message-
> From: owner-openssl-...@openssl.org [mailto:owner-openssl-...@openssl.org]
> On Behalf Of EXT-Glatting, Dennis P
> Sent: Monday, December 06, 2010 8:30 PM
> To: openssl-dev@openssl.org
> Subject: RE: Loo
ge-
> From: owner-openssl-...@openssl.org [mailto:owner-openssl-...@openssl.org]
> On Behalf Of EXT-Glatting, Dennis P
> Sent: Monday, December 06, 2010 8:00 PM
> To: openssl-dev@openssl.org
> Subject: Loop bug(?) in X509_verify_cert() => x509_vrfy.c:254
>
> I have a set of cr
I have a set of cross certified CAs feeding a wireless Access Point and
supplicant. This structure will look a bit strange but that is by design
(testing). I have four CAs: CAa, CAb, CAc, and CAd.
My structure is:
CAd --> supplicant
|
|--> CAa -> CAb --> hostapd
> -Original Message-
> From: Savard Mike (EXT-NIC/Ottawa)
> Sent: Tuesday, August 08, 2000 1:52 PM
> To: '[EMAIL PROTECTED]'; ',[EMAIL PROTECTED]'
> Subject: Client alert message
>
> Hello there,
>
> I would like to use