Hi,
After multiple calls to ERR_load_crypto_string(),
we cannot get error message using ERR_error_string().
A short sample is as follows:
=
#include
int main()
{
ERR_load_crypto_strings();
printf("%s\n",ERR_error_string(101163138,NULL));
ERR_free_strings();
ERR_load_crypt
sorry was a typo in the last post.. # openssl ca revoke file.pem # openssl ca -gencrl -out revokefile.crl # openssl crl -in revokefile.crl -noout -CAfile file.pemmichael Dorrian <[EMAIL PROTECTED]> wrote:try this: # openssl ca revoke file.pem # openssl ca -gencrl -out revokefile.crl #
try this: # openssl ca revoke file.pem # openssl ca -gencrl -out revokefile.crl # openssl crl -in exampleca.crl -noout -CAfile file.pem[EMAIL PROTECTED] wrote: HelloI built a web server with apache 2.xx. Access is secure with SSLVerifyClient directiveWhen I revoke a certificate and then generat
hi
i am using openssl toolkit and not custom source code to the following
operation :
- i have to add a custom attribute say :
CertVersionID ::= SEQUENCE {
hashAlgorithm AlgorithmIdentifier,
issuerNameHash OCTET STRING
issuerKeyHash OCTET STRING
seria
Hi all,
I've implemented an SSL server and now, I try to display pages in web
browsers.
I have a different behaviour depending on the machine. My first machine
is a XP and everything works fine.
The second one is a Windows 2000 and I have this error : "Failed to
parse" with no more explanation.
Hi, I'm using OpenSSL on Tomcat. I have configured Tomcat to use OpenSSL successful. Now, I want to customize some algorithms. To do that, I face 2 problems: - How to rebuild the source of OpenSSL - I'm using Tomcat 5 & Windows XP Professional SP2, so I configured Tomcat to use OpenSSL (not
Hi, Now, I want to use OpenSSL with Tomcat 5, Windows XP Professional SP2. I want to use SSL on Tomcat 5 and I want to customize some cipher algorithms of OpenSSL. How can I do this? Thanks, Hung.
Relax. Yahoo! Mail
virus scanning helps detect nasty viruses!
Hi everyone,
I'm attempting to store my pre-existing RSA key/certificate into a Java
keystore using the extkeytool. I got my server certificate signed by the
Bossie CA, which is a CA that issues certificates for nothing more then
testing purposes. When I run the command ""extkeytool -importkey -ali
There
is no need to create a new makefile at all. If your build was successful, you
will have the openssl executable(s) present already. You can use the command
line for testing:
openssl ca
openssl crl
openssl pkcs12
etc
-Original Message-From:
[EMAIL PROTECTED] [mailto:
I figured out what the error was and it was a syntax error! The forward
slash (\) in the middle shouldn't be there. Cheers.
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]
> Sent: 22 March 2006 12:31
> To: openssl-users@openssl.org
> Subject: Con
So this mean it is just enough to create
new make file to compile C files for mkreq and mkca and directly I can use X509
utility?
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
Behalf Of Ambarish Mitra
Sent: Wednesday, March 22, 2006
6:06 PM
To: openssl-users@openssl.org
x509
ca - all CA management utilities
x509
crl - all CRL management utilities.
etc.
The
documentation is there in the site. If you have any specific questions, do let
us know and we shall try to help you.
"How to create exe for
X509?" - There is no need to 'create'. Once you
succ
Hi everyone,
I'm trying to convert a PEM formatted key to a PKCS8 format with the command
shown below but I can't seem to get the intended PKCS8 format file.. I've
also added the output I get once I use the command shown below. Any sort of
help or insight would be greatly appreciated. Cheers
C:\
Hi,
OPENSSL
---
demo/x509
I noticed that Makefile is not there for X509
in demo folder.
So tried to build in X509 by creating new
makefile and was able to get .o and exe for two C files present in X509
directory.
I have question about X509 usage. How to
test this command
Hello
I built a web server with apache 2.xx. Access is secure with
SSLVerifyClient directive
When I revoke a certificate and then generate my CRL, I can verify that
the certificate has been well revocated and is part of the CRL with the
following commands :
openssl ca -config openssl.cnf -revok
15 matches
Mail list logo