I'm working on a project that is using X509 certs for custom uses. As a
part of this, I've experimented with teaching openssl about new OIDs, and
about new X509 extensions. I've found out some stuff I'd like to share.
First, the comment in crypto/conf/README about the oid module ("A set of
builtin
Hi,
Is there any How-to/tutorial, which I can use to integrate my own
crypto code into the openssl library (for my use only)..
Or
Is hacking into the OpenSSL source code the only way to start.
Any help appreciated.
Shank
_
Hi,
Thanks. Can you (or anyone else) tell me under what conditions or what
determines which of these cases "happens"?
In other words, what "decides" to use, say, one certificates only
(presumably the root CA cert) vs. certificate chains?
takamichi saito wrote:
>
> > Hi,
> >
> > I've been
Hi everyone,
I don't know if I post this message in the correct
list.
My company asked me to install GPKCS11 in Windows
2000 and add gpkcs11 module to Netscape. I spent several nights to do
it and still have no luck. The
documentation of GPKCS11 is not very helpful.
-- I installed OP
(B
(B> Hi,
(B>
(B> I've been reading the subject book, by Eric Rescorla, and ran across the
(B> following passage on page 110 (Chapter 4, under "CertificateRequest"):
(B>
(B> "It is important to note that IF certificate chains are being used, then
(B> the CA name specified in the Certifi