Do you have a question? Post it now! No Registration Necessary. Now with pictures!
April 11, 2015, 3:58 am
rate this thread
from rfc3279 (x.509)
-Signature Algorithms (section 2.2)
-Subject Public Key Algorithms (section 2.3)
From TLS cryptosuite:
-key exchange algorithms
Are the selected algorithms for these parameters related or independent? Can someone explain how each are used.
- » I bet some folks out here are familiar with Google Authentication?
- — Previous thread in » Secure Shell Forum
- » protocol question - issue with exit-status inside unfinished data stream?
- — Newest thread in » Secure Shell Forum