At 02:24 AM 5/14/2004 +0200, Dr. Stephen Henson writeth:
>On Thu, May 13, 2004, Thomas J. Hruska wrote:
>
>> Use the following for duplication of this issue:
>>
>> 1) A default build of OpenSSL 0.9.7d for Windows. Use MSVC++ 6 SP5 to
>> build it.
>>
>> 2) A sample text file to encrypt using S/
On Thu, May 13, 2004, Thomas J. Hruska wrote:
> Use the following for duplication of this issue:
>
> 1) A default build of OpenSSL 0.9.7d for Windows. Use MSVC++ 6 SP5 to
> build it.
>
> 2) A sample text file to encrypt using S/MIME (this example assumes the
> text file's name is "test.txt").
Use the following for duplication of this issue:
1) A default build of OpenSSL 0.9.7d for Windows. Use MSVC++ 6 SP5 to
build it.
2) A sample text file to encrypt using S/MIME (this example assumes the
text file's name is "test.txt").
3) A sample certificate to encrypt the message with (this
Perhaps if you could use gdb to display a stack trace, it would be
easier to locate the error.
-Original Message-
From: Jeff Fulmer <[EMAIL PROTECTED]>
Sent: May 13, 2004 8:24 AM
To: [EMAIL PROTECTED]
Subject: Re: X509_get_subject_name
It didn't. It still core dumps on Red Hat systems.
Hi Ken,
Ken Goldman wrote:
Could you be a bit more specific. 7.1.1 doesn't give any examples,
and combines padding with encryption in a way that's hard to separate.
How can the 'from' length be modulus-1? In my case, I'm receiving a
256 byte value. I decrypt with the private key, and still have
Could you be a bit more specific. 7.1.1 doesn't give any examples,
and combines padding with encryption in a way that's hard to separate.
How can the 'from' length be modulus-1? In my case, I'm receiving a
256 byte value. I decrypt with the private key, and still have a 256
byte value. I then
On Thu, May 13, 2004, David Gianndrea wrote:
>
>
> If I sent my self a signed message, is there a way using the openssl
> command to see what the SMIMECapabilities attribute is set too? Would
> it be a list of the OID's of all the ciphers?
>
>
If you create an email sign it and save as a draf
Dr. Stephen Henson wrote:
Well you could look at the S/MIME v2 specs, the SMIMECapabilities attribute is
specified in RFC2311.
Ok the fog is starting to clear a bit. In looking at other mail clients
mainly the current Outlook, and Outlook Express I can see that there
are ways to set the minimum le
Steve,
Sorry, you're right. I should expect answers as descriptive as my
questions. My appologies for letting my frustration show.
Ok. I'll take a more detailed look at the asn1 but I'm not sure that I'm up
to the manual verification.
Thanks for your help (and patience).
take care,
e
On Thu, May 13, 2004, [EMAIL PROTECTED] wrote:
> Hi ,
> I got the below error when I was trying to convert a .cer certificate file
> to .pem using the openssl cmd.
>
> openssl x509 -in TF.cer -inform d -out TF.pem
> unable to load certificate6384:error:0D09F007:asn1 encoding
> routines:d2i_X509:
On Thu, May 13, 2004, Eleanor Nagai wrote:
> Hi!
>
> 1.Is it possible to tell whether a signature is PKCS1v15 or PSS
> encoded?
Yes.
> 2.Is it possible to verify a signature encoded as RSASSA-PSS in
> openssl?
>
No, or at least not directly.
Though you probably want more detail th
Hi!
1. Is it possible to tell whether a signature is PKCS1v15 or PSS
encoded?
2. Is it possible to verify a signature encoded as RSASSA-PSS in
openssl?
thanks for your help,
e
__
OpenSSL Project
[EMAIL PROTECTED] wrote:
Hi,
Still i am getting the same Error.
openssl x509 -inform der -in TF.cer -out TF.pem
unable to load certificate
6439:error:0D09F007:asn1 encoding routines:d2i_X509:expecting an asn1
sequence:x_x509.c:102:address=1500880 offset=0
Are you sure that in your *.cer file is a D
Hi,
Still i am getting the same Error.
openssl x509 -inform der -in TF.cer -out TF.pem
unable to load certificate
6439:error:0D09F007:asn1 encoding routines:d2i_X509:expecting an asn1
sequence:x_x509.c:102:address=1500880 offset=0
Thanks Janardhan, Please let me know if you have more idea.
Tha
Hi,
i am using this command for the same, i hope this will serve ur purpose.
"openssl x509 -inform der -in xxx.cer -out xxx.pem"
Janardhan
[EMAIL PROTECTED] wrote:
Hi ,
I got the below error when I was trying to convert a .cer certificate file
to .pem using the openssl cmd.
openssl x509 -in TF.cer
..\openssl genrsa -out mcg.key -des3 2048
..\openssl req -out mcg.csr -new -key mcg.key
..\openssl req -out mcg.crt -x509 -key mcg.key -in mcg.csr
..\openssl pkcs12 -export -in mcg.crt -inkey mcg.key \
> -out mcg_openssl.p12 -name MCG_Gestión
But i need that the Sigature Algoritme will be SHA1RSA
On Thu, May 13, 2004, David Bolufer wrote:
> Hello!
>
> I generate this certificate
>
>
> ..\openssl genrsa -out mcg.key -des3 2048
> ..\openssl req -out mcg.csr -new -key mcg.key
> ..\openssl req -out mcg.crt -x509 -key mcg.key -in mcg.csr
>
> The I execute ..\openssl pkcs12 -export -i
Hi ,
I got the below error when I was trying to convert a .cer certificate file
to .pem using the openssl cmd.
openssl x509 -in TF.cer -inform d -out TF.pem
unable to load certificate6384:error:0D09F007:asn1 encoding
routines:d2i_X509:expecting an asn1 sequence:x_x509.c:102:address=1500880
offset
On Thu, May 13, 2004, Antonio Andrés Espallardo wrote:
> Hi everybody.In my program I make a pkcs7_sign on a ASN1 message, and after
> that I apply a pkcs7_encrypt on the signed message. When I try the inverse
> process, the pkcs7_decrypt function decrypt the content from the PKCS#7
> envelopedDa
Hello!
I generate this certificate
..\openssl genrsa -out mcg.key -des3 2048
..\openssl req -out mcg.csr -new -key mcg.key
..\openssl req -out mcg.crt -x509 -key mcg.key -in
mcg.csr
The
I execute ..\openssl pkcs12 -export -in mcg.crt -inkey mcg.key -out
mcg_openssl.p12 -name MCG_Ges
Hi everybody.In my program I make a pkcs7_sign on a
ASN1 message, and after that I apply a pkcs7_encrypt on the
signed message. When I try the inverse process, the pkcs7_decrypt function
decrypt the content from the PKCS#7
envelopedData structure and store it in a BIO data.
My problem is h
can somebody give me some pointers ?
regds.
>>> [EMAIL PROTECTED] 5/12/2004 9:15:27 PM >>>
I'm using a non-blocking socket on the server side.
I'm polling on the socket after accepting the TCP connection.
On seeing some data, I do a SSL_accept() on the socket before
proceeding further.
This f
22 matches
Mail list logo