I am doing ECDSA signing and verification of SHA-512 digests.
1.0.0a. I don't know about 0.9.8.
From: Rick Lopes de Souza dragonde...@gmail.com
Does Openssl support ecdsa with sha256 and sha512?
Only above of 1.0.0 ?
Bonjour,
Hodie III Kal. Sep. MMXI, Jakob Bohm scripsit:
[...]
1) The CA has changed/improved the attributes, e.g. by extending the
expiry date or adding a CRL
location for detecting future root cert revocation (a good
precaution for CA's to take, coupled with
a pre-generated key compromise
I downloaded source files from official OpenSSL site -
(http://www.openssl.org/source/). I follow the INSTALL.M32 file in
OpenSSL folder. I open msys.bat, go to the OpenSSL folder, then type
$ ./config
It says Configured for MinGW, than I type
$ make
and after few minutes
Download source files from official OpenSSL site -
(http://www.openssl.org/source/). I follow the INSTALL.M32 file in
OpenSSL folder. I open msys.bat, go to the OpenSSL folder, then type
$ ./config
It says Configured for MinGW, than I type
$ make
and after few minutes
On 8/31/2011 5:57 PM, Hopkins, Nathan wrote:
Thanks this is very helpful!
Now I have the challenge of using multiple hostnames - any advice on how
I could do this would be much appreciated?
I'd like to have one cert that allows me to use below for example;
https://sitename
On 8/31/2011 11:07 AM, Erwann ABALEA wrote:
Bonjour,
Hodie III Kal. Sep. MMXI, Jakob Bohm scripsit:
[...]
1) The CA has changed/improved the attributes, e.g. by extending the
expiry date or adding a CRL
location for detecting future root cert revocation (a good
precaution for CA's to take,
Hello,
I need to incorporate, in a program in C, who send mail of my users, a
S/MIME signature.
I've already sign, for test, a text message, and an html message, with
command openssl smime -sign.. and it's ok. (without headers of course, i had
them later), and I see if message have text and html
Many thanks, however afraid no joy yet. After editing and adding
@alt_names for a custopenssl.cnf and running openssl req -new -key
server.key -out server.csr -config custopenssl.cnf when trying to access
through a browser (firefox) I get the error code:
ssl_error_bad_cert_domain.
We are using
Before using the cert, test it with the command:
openssl x509 -in yourcert.cer -noout -text
If the parameters were in the right place, you should see all the extra
names as
SubjectAlternativeName attributes in the cert.
On 8/31/2011 11:52 PM, Hopkins, Nathan wrote:
Many thanks, however
I tested with below, all looks good. After running I am converting to .der
files and generating a keystore with ImportKey.java - could this be removing
what is needed?
- Original Message -
From: owner-openssl-us...@openssl.org owner-openssl-us...@openssl.org
To:
10 matches
Mail list logo