similar to: Check public/private RSA keypairs

Displaying 20 results from an estimated 300 matches similar to: "Check public/private RSA keypairs"

2019 Apr 11
1
decrypt.rb
> On 11 April 2019 17:44 David Salisbury via dovecot <dovecot at dovecot.org> wrote: > > > On 4/11/2019 1:50 AM, Aki Tuomi wrote: > > > >> ... > >> So, not being an expert at encryption, what are the ramifications of > >> those digests being read as different values in the two different > >> places???? I do notice that the
2015 Aug 18
1
multiple nodes/servers
Thank you Lars for the reply. Your instructions were dead on. Yes I have considered the security risks; however, I think scaleability and rapid deployment out weigh the security risks for me. On Aug 18, 2015, at 6:31 AM, Lars Kruse <lists at sumpfralle.de> wrote: > Hi, > >> Is it possible to generate one key pair? > > Maybe this is all you want to know? > openssl
2019 Jul 03
3
mail_crypt: multiple keypairs
Hello, I am testing mail_crypt plugin with per account encryption and wanted to generate a new keypair for an account but noticed that I now end up with 2 keypairs where one is active and the other inactive as you can see below: $ doveadm mailbox cryptokey list -u email at domain.tld -U Folder Active Public ID yes 7b140b4f3d6d68eed2c59259ac5e6f6a280dc82990292dc415b4100d6c797f67
2012 Feb 27
0
Article on Fingerprinting Public/Private Keypairs
I have published the preview of a "hints and tips" article for the upcoming print edition of Secure Computing Magazine (Australia) on OpenSSH Public/Private Key Fingerprinting, including "BubbleBabble" encoding and the ASCII ?randomart image?, at http://cmlh.id.au/tagged/openssh -- Regards, Christian Heinrich http://cmlh.id.au/contact
2019 Jul 04
0
mail_crypt: multiple keypairs
On 3 Jul 2019, at 06:38, mabi via dovecot <dovecot at dovecot.org> wrote: > Is it possible to delete the inactive keypair? if yes how? Wouldn?t you then be unable to encrypt previous emails?
2019 Jul 04
1
mail_crypt: multiple keypairs
??????? Original Message ??????? On Thursday, July 4, 2019 11:17 AM, @lbutlr via dovecot <dovecot at dovecot.org> wrote: > > Is it possible to delete the inactive keypair? if yes how? > > Wouldn?t you then be unable to *unencrypt* previous emails? That's also what I thought but based on my understand and on the documentation of the "mailbox cryptokey generate"
2019 Apr 11
0
decrypt.rb
On 4/11/2019 1:50 AM, Aki Tuomi wrote: > >> ... >> So, not being an expert at encryption, what are the ramifications of >> those digests being read as different values in the two different >> places???? I do notice that the get_pubid_priv() function is internal to >> the decrypt.rb script and calls several OpenSSL functions. >> >> -Dave > Hmm... can
2015 Aug 18
0
multiple nodes/servers
Hi, > Is it possible to generate one key pair? Maybe this is all you want to know? openssl genrsa -out private.key 4096 openssl rsa -pubout -in private.key -out public.key I assume that you analyzed the risks and benefits of a single shared key according to your specific setup. Lars
2020 Jul 18
10
[Bug 3195] New: ssh-keygen unable to convert ED25519 public keys
https://bugzilla.mindrot.org/show_bug.cgi?id=3195 Bug ID: 3195 Summary: ssh-keygen unable to convert ED25519 public keys Product: Portable OpenSSH Version: 8.2p1 Hardware: amd64 OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: ssh-keygen Assignee:
2014 Jul 26
0
[RFC PATCH 03/11] PCI/MSI: Refactor pci_dev_msi_enabled()
Pci_dev_msi_enabled() is used to check whether device MSI/MSIX enabled. Refactor this function to suuport checking only device MSI or MSIX enabled. Signed-off-by: Yijing Wang <wangyijing at huawei.com> --- arch/cris/arch-v32/drivers/pci/bios.c | 2 +- arch/frv/mb93090-mb00/pci-vdk.c | 2 +- arch/ia64/pci/pci.c | 4 ++--
2009 Sep 15
0
chinese character support issue of rcom
Dear Sir, rcom is a great package of R. Yet it seems that there is some problem of Chinese character supporting. comGetPropery() always get the part of the Chinese character. Any suggestion would be appreciated. Thanks. Michael > library(rcom) Loading required package: rscproxy > txe<-comCreateObject("Excel.Application") > comSetProperty(txe,"Visible",TRUE);
2019 Jul 03
3
[PATCH v2 06/35] crypto: Use kmemdup rather than duplicating its implementation
kmemdup is introduced to duplicate a region of memory in a neat way. Rather than kmalloc/kzalloc + memcpy, which the programmer needs to write the size twice (sometimes lead to mistakes), kmemdup improves readability, leads to smaller code and also reduce the chances of mistakes. Suggestion to use kmemdup rather than using kmalloc/kzalloc + memcpy. Signed-off-by: Fuqian Huang <huangfq.daxian
2019 Jul 03
3
[PATCH v2 06/35] crypto: Use kmemdup rather than duplicating its implementation
kmemdup is introduced to duplicate a region of memory in a neat way. Rather than kmalloc/kzalloc + memcpy, which the programmer needs to write the size twice (sometimes lead to mistakes), kmemdup improves readability, leads to smaller code and also reduce the chances of mistakes. Suggestion to use kmemdup rather than using kmalloc/kzalloc + memcpy. Signed-off-by: Fuqian Huang <huangfq.daxian
2013 Apr 16
4
2nd NIC troubles
Hi All, I have 2 NICS in this system. CentOS 6.4 eth0 is the virtual IP from PFSense mapping connected to the router, works fine. eth1 is a second NIC that I have assigned a private IP to and connected it to a switch on the private network. I have many other private devices, so I know this setup works. When I connect the cable to the switch and bring up eth1 the system basically stops taking
2019 Jul 03
0
[PATCH 05/30] crypto: Use kmemdup rather than duplicating its implementation
kmemdup is introduced to duplicate a region of memory in a neat way. Rather than kmalloc/kzalloc + memset, which the programmer needs to write the size twice (sometimes lead to mistakes), kmemdup improves readability, leads to smaller code and also reduce the chances of mistakes. Suggestion to use kmemdup rather than using kmalloc/kzalloc + memset. Signed-off-by: Fuqian Huang <huangfq.daxian
2019 Jul 03
0
[PATCH v2 06/35] crypto: Use kmemdup rather than duplicating its implementation
On Thu, Jul 04, 2019 at 12:27:08AM +0800, Fuqian Huang wrote: > kmemdup is introduced to duplicate a region of memory in a neat way. > Rather than kmalloc/kzalloc + memcpy, which the programmer needs to > write the size twice (sometimes lead to mistakes), kmemdup improves > readability, leads to smaller code and also reduce the chances of mistakes. > Suggestion to use kmemdup rather
2014 Aug 20
1
[RFC PATCH 03/11] PCI/MSI: Refactor pci_dev_msi_enabled()
> -----Original Message----- > From: linux-pci-owner at vger.kernel.org [mailto:linux-pci-owner at vger.kernel.org] > On Behalf Of Yijing Wang > Sent: Saturday, July 26, 2014 8:39 AM > To: linux-kernel at vger.kernel.org > Cc: Xinwei Hu; Wuyun; Bjorn Helgaas; linux-pci at vger.kernel.org; > Paul.Mundt at huawei.com; James E.J. Bottomley; Marc Zyngier; linux-arm- > kernel at
2014 Aug 20
1
[RFC PATCH 03/11] PCI/MSI: Refactor pci_dev_msi_enabled()
> -----Original Message----- > From: linux-pci-owner at vger.kernel.org [mailto:linux-pci-owner at vger.kernel.org] > On Behalf Of Yijing Wang > Sent: Saturday, July 26, 2014 8:39 AM > To: linux-kernel at vger.kernel.org > Cc: Xinwei Hu; Wuyun; Bjorn Helgaas; linux-pci at vger.kernel.org; > Paul.Mundt at huawei.com; James E.J. Bottomley; Marc Zyngier; linux-arm- > kernel at
2006 Nov 24
1
What's wrong in these configurations?
Hi guys!! I've followed the windows 2000/xp tutorial and not only, but it seems not to work! I've for sure committed some errors... PC (under NAT) files: tinc/vpn/tinc.conf tinc/vpn/rsa_key.priv tinc/vpn/hosts/elegos tinc/vpn/hosts/shadowkrad tinc.conf: Name = elegos ConnectTo = shadowkrad TCPOnly = yes Interface = VPN (TCPOnly as under a NAT) rsa_key.priv: -----BEGIN RSA PRIVATE
2015 Aug 17
3
multiple nodes/servers
Greetings, I hope this message finds you well? First off, thank you for a great product. Is it possible to generate one key pair? This way I only have to copy one set of files over to the nodes. For instance I have roughly 50 machines that I need in the mesh network. I want to be able to create 1 master key pair and distribute that master key pair to all the nodes. This way the nodes can all