i'm working on an embedded micro computer, and i would like to have a
webservice. However the data needs to be encrypted. I was thinking of
using SSL for that, but i only have 32K for everything. OS, tcp/ip,
devicedriver, webserver, and ssl.
Can i make any hope of trimming openSSL down to
Den 11. okt 2004, kl. 13:54, skrev Jörn Hartmann:
Maybe I'm wrong, but I think think it's hardly possible to strip
openssl down to less than 32K and keep full SSL functionality. You
might have more luck in writing your own SSL implementation. That will
be tough enough assuming you got only a
i can verify a certificate against a root certificate, with
openssl verify -CAfile root.ca rsacert.pem
but how do i know that the certificate i try to verify has not been
revoked?
JonB
__
OpenSSL Project
Den 21. sep 2004, kl. 15:43, skrev Lee Baydush:
You can't tell if it has been revoked. That's why they are 'trusted
roots'. If you think your root ca has been compromised, that is when
you usually hit the big red panic button and shut down the shop.
no no, it's not the root ca that has been
Running these 2 commands does work
openssl dgst -out ud -sign rsakey.pem README
openssl dgst -verify rsapub.pem -signature ud README
output is
Verified OK
but with -hex it complains
openssl dgst -hex -out ud.hex -sign rsakey.pem README
openssl dgst -verify
Den 27. aug 2004, kl. 18:33, skrev Dr. Stephen Henson:
On Fri, Aug 27, 2004, Jon Bendtsen wrote:
So, am i doing anything wrong, or is there a bug in openssl?
Can i translate the -c - hex or -hex output to a binary file before i
verify that?
If so, how do i do that?
Not so much a bug as something