Hello All, I get 3 core dump errors while using the openssl command line tool. Error 1:1) I generated a self signed certificate using the following commandopenssl req -x509 -out ca_cert.pem -new -keyout cacert_priv_key.pem -subj /C=US/ST=California/L=Cupertino/O=test/CN=myname -nodes 2)I
On Wed, Jun 23, 2004, Christian Weber wrote:
> OK, the previous answer was pretty fast - thank you.
>
> Now there´s another stupid question: why does the command
>
> >openssl ocsp -respin ocsp.resp -CAfile CAs.pem
>
> lead to
>
> >Response Verify Failure
> >19961:error:27069070:OCSP routines:O
Hi,
In fact, I think you should have a look at java SSL mailing list because JSSE is java.
Apache is using openssl, so you should have a look at apache ssl_error.log or
ssl_engine.log.
As far as I know it RC4 alogorithm does not required any IV (at DES or 3DES opposite
for example) that's why yo
OK, the previous answer was pretty fast - thank you.
Now there´s another stupid question: why does the command
openssl ocsp -respin ocsp.resp -CAfile CAs.pem
lead to
Response Verify Failure
19961:error:27069070:OCSP routines:OCSP_basic_verify:root ca not
trusted:ocsp_vfy.c:148:
though the correct
I think I understand how I was wrong, most of the stuff I
work with negotiates the secure connection immediately,
such as web on 443 (https) and ldaps (667?). I see that
if there was a reqired interaction before switching over
into secure mode (which is TLS rather than SSL?) that it
might not be s
On Wed, Jun 23, 2004, Christian Weber wrote:
> I tried to ask this question to the list before, but seemingly the
> attachment blocked it´s way. So the attachment is included as base64-block.
>
> Requesting information on signtrust (german, Deutsche Post AG) generated
> smartcard
> certificates
On Wed, Jun 23, 2004 at 07:47:35AM -0400, Charles Cranston wrote:
> It's not hard at all to use openssl s_client to try to
> make a connection and to see the certificate that is
> being presented by the server. If you use the -showcerts
> option it will even show the entire certificate chain being
Hello OpenSSL community,
Im trying to compile OpenSSL 0.9.6x with GDB debugging capabilities but am
having little success. Specifically, I have included the g compile flag
in the Makefiles in /openssl_src/Makefile, /openssl_src/crypto/Makefile,
and /openssl_src/crypto/bn/Makefile.
As an exam
I tried to ask this question to the list before, but seemingly the
attachment blocked it´s way. So the attachment is included as base64-block.
Requesting information on signtrust (german, Deutsche Post AG) generated smartcard
certificates leads to a download of a "signed response".
Examining the re
It's not hard at all to use openssl s_client to try to
make a connection and to see the certificate that is
being presented by the server. If you use the -showcerts
option it will even show the entire certificate chain being
presented by the server, instead of just the end-user cert.
I have good l
I have been looking on the message board for EVP_PKEY_dup() and found
comments as "no EVP_PKEY_dup() function? Thats an omission which will
be fixed" and dates back to 2000.
My current openssl 0.9.7d does not have any EVP_PKEY_dup()
[1] http://www.mail-archive.com/[EMAIL PROTECTED]/msg06345.html
[2
11 matches
Mail list logo