Hi ALL,
I am trying to use openssl pkcs11 engine . I have more than pkcs11 provider
and I want my customer to specify which pkcs11 provider they want to use .
For this I am thinking to modify the openssl.cnf file and
have one option
pkcs11_lib32=/usr/lib/pkcs11/opencryptoki.so
pkcs11_lib64=/usr
Hi ALL,
I am trying to use openssl pkcs11 engine . I have more than pkcs11 provider
and I want my customer to specify which pkcs11 provider they want to use .
For this I am thinking to modify the openssl.cnf file and
have one option
pkcs11_lib32=/usr/lib/pkcs11/opencryptoki.so
pkcs11_lib64=/usr
Hi ALL,
I was trying to write openssl pkcs11 engine implementation for RSA . Now ,I
am stuck with the implementating RSA padding which is required for RSA
encryption,decryption ,signing and verifying.
I was trying to find the mechanism which is needed for each padding.
RSA_PKCS1_PADDING ---> M
Hi ALL,
I was wondering why OpenSSL team have not supported pkcs11 engine. I can see
in the contribution list
http://www.openssl.org/contrib/ http://www.openssl.org/contrib/ , some of
the user have already contributed pkcs11 support patch . Why openssl team
have not included this in the main s
Hi ALL,
I am new to OpenSSL and need some help on pkcs11.
1 . Does the latest OpenSSL 0.9.8k support the pkcs11 support?
If so , how to configure the openssl with pkcs11 support?
2. I have searched through openssl for finding some document regarding
pkcs11 but was not able to find any good doc
://cvs.openssl.org/chngview?cn=18790 atleast disconnect the
connection if renegotiation and which was suppose to be done to deal with
this problem.
Please correct me if i am wrong? and also please guide me which patch need
to be used .
Thanks in Advance
Samuel
Samuel123smith wrote:
>
> Hi ALL,
Hi ALL,
I am newbie to openssl and i have recently joined in openssl activities.As
we all know , we have come across the security vulnerability issue
CVE-2009-3555 and i need to patch the OpenSSL 0.9.8k version. I was going
from some of query already in this forum .
>From this link
http://www.d