Robinson, Richard L (Rick) wrote:
> I checked the RSA web site and could not find the paper you
> are referencing. Could you please forward me a link?
I really don't see how you could have missed it. It is only the
10th listing on their Technical Notes page:
http://www.rsasecurity.com/rsalabs/te
On Wed, Jun 04, 2003, Krause, Helga wrote:
> Hello to all,
> I produced a text mail + attachment (file) and signed this file using
> openssl smime sign command. Verifying this output using Outlook produced an
> invalid signature with the error message: message has been tampered with.
> Verifying u
Hello to all,
I produced a text mail + attachment (file) and signed this file using
openssl smime sign command. Verifying this output using Outlook produced an
invalid signature with the error message: message has been tampered with.
Verifying using openssl (linux) produced a valid result.
Does any
On Wed, Jun 04, 2003, Tiago Antao wrote:
> Hi!
>
> A very simple question about DNs:
> Sometimes DNs are represented with / eg,
> /C=NL/CN=sdfsf
> Sometimes with , eg
> C=NL, CN=sdfsf
>
> Are they both considered formal standards or is one of them the formal one?
>
They are only standards in t
Hi!
A very simple question about DNs:
Sometimes DNs are represented with / eg,
/C=NL/CN=sdfsf
Sometimes with , eg
C=NL, CN=sdfsf
Are they both considered formal standards or is one of them the formal one?
Thanks for any help
--
Tiago Antao - RIPE NCC
"Don't tell me how hard you work. Tell me how
Hi there.
My app gets a packet of SSL protocol data from the network. Stuffs it into
a BIO (BIO_s_mem()) and I then plan to call SSL_read to dump out the plain
text data.
My first intuitive assumption is to loop on SSL_pending while running
SSL_read. But then it seems both from the man page and f
Frank wrote:
I'm sorry you are correct. I thought I had this right but I'm not comming
up with the right key on each side. if I want to multiply a pt and an
integer is this The way i woudl do it?
EC_POINT_mul(group, resultingPt, &(group->order), thePtToMulti,
theIntegerToMulti, ctx);
No, EC_POINT_
In message <[EMAIL PROTECTED]> on Wed, 4 Jun 2003 01:29:32 +0200 (CEST), mohamed
zhaounia <[EMAIL PROTECTED]> said:
mzhaounia> Hi all!
mzhaounia> i have added a new cammnd in openssl.
mzhaounia> The compilation was without error but although the
mzhaounia> .obj file was generated, openssl does no
In message <[EMAIL PROTECTED]> on Tue, 3 Jun 2003 14:30:29 -0500, "Aaron Axelsen"
<[EMAIL PROTECTED]> said:
axelseaa> Is there a major difference between the two? My guess would
axelseaa> be that eventually everthing will move to the 0.9.7 series.
axelseaa> If thats the case, I would think it m
I checked the RSA web site and could not find the paper you are referencing. Could
you please forward me a link?
Thanks,
Rick
-Original Message-
From: Charles B Cranston [mailto:[EMAIL PROTECTED]
Sent: Tuesday, June 03, 2003 10:04 AM
To: [EMAIL PROTECTED]
Subject: Re: testing for primal
On Thu, May 29, 2003, Andreas wrote:
> On Thu, May 29, 2003 at 10:24:49PM +0200, Dr. Stephen Henson wrote:
> > > I would think crl_check_all would check the whole chain, but it seems that
> > > crl_check is doing
> > > that instead. Any hints?
> > >
> >
> > Are you sure that's OpenSSL 0.9.7b? T
On Tue, Jun 03, 2003, David Kramer wrote:
> I'm using client certificate verification via
> SSL_CTX_set_client_CA_list() and SSL_CTX_load_verify_locations(). I'd
> like to add CRLs. The only way that I've found to do this is to call:
>
> X509_STORE *store = SSL_CTX_get_cert_store(ctx);
>
Hi all!
i have added a new cammnd in openssl.
The compilation was without error but although the
.obj file was generated, openssl does not find the new
command.
Certainly there is a file that i have to modify to
find the contibution but i can't know what is it.
Is there any modification that i hav
I'm using client certificate verification via
SSL_CTX_set_client_CA_list() and SSL_CTX_load_verify_locations(). I'd
like to add CRLs. The only way that I've found to do this is to call:
X509_STORE *store = SSL_CTX_get_cert_store(ctx);
X509_STORE_set_flags(store, X509_V_FLAG_CRL_CHECK
I'm sorry you are correct. I thought I had this right but I'm not comming
up with the right key on each side. if I want to multiply a pt and an
integer is this The way i woudl do it?
EC_POINT_mul(group, resultingPt, &(group->order), thePtToMulti,
theIntegerToMulti, ctx);
I'm really guessing here
You could try something like:
echo [ req ] > abc\abc_csr.conf
echo distinguished_name=req_distinguished_name >> abc\abc_csr.conf
echo req_extensions = v3_req >> abc\abc_csr.conf
echo prompt=no >> abc\abc_csr.conf
echo [ req_distinguished_name ] >> abc\abc_csr.conf
echo C=AU >> abc\abc_csr.conf
ec
> if (RAND_bytes((unsigned char *)ret, sizeof(DES_cblock)) != 1)
> {
> errCode = ERR_get_error();
> ERR_error_string(errCode, errString);
> printf("RAND_bytes Error: %s\n", errString);
>
> And here is what i get from the printf:
>
> RAND_bytes Error: error:24064064:lib(36):fun
Title: Error code?
Hi,
I wrote the following lines:
if (RAND_bytes((unsigned char *)ret, sizeof(DES_cblock)) != 1)
{
errCode = ERR_get_error();
ERR_error_string(errCode, errString);
printf("RAND_bytes Error: %s\n", errString);
And here is what i get from the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Is there a major difference between the two? My guess would be that
eventually everthing will move to the 0.9.7 series. If thats the
case, I would think it makes more sense to upgrade to the 0.9.7
series
- ---
Aaron Axelsen
AIM: AAAK2
Email: [EMA
Many thanks Vadim for assuring me that keys/certificates can't work if they
are not matched, and your observations on my architecture.
My vision is that (k0) (2048 bits) will *never* be compromised during
application's life (~20 years), as it is kept in a bank safe in a sealed
envelope, and is use
On Tue, Jun 03, 2003, Ivan Dole¾al wrote:
> Hello,
>
> I wanted to use a certificate to verify an e-mail. While Mozilla has no
> problem with that, OpenSSL 0.9.7a Feb 19 2003 :
>
> openssl smime -verify -CAfile cacert.pem -in smimetest -signer
> 12.pem
>
> Verification failure
> 26660:error:21
Hello,
I wanted to use a certificate to verify an e-mail. While Mozilla has no
problem with that, OpenSSL 0.9.7a Feb 19 2003 :
openssl smime -verify -CAfile cacert.pem -in smimetest -signer
12.pem
Verification failure
26660:error:21075075:PKCS7 routines:PKCS7_verify:certificate verify
error:/usr
All,
I am in the process
of shipping software with opensll and I need the CCATS number from BIS (Formerly
BXA) in order to export. I need the ECCN in correspondence with the CCATS
number. If you have this information please let me know
Thanks,
Eric
The information contained in this tran
23 matches
Mail list logo