Hi all,
I am just wondering if i could have multiple applications on a end
host share the same public key. Can this cause a pbm in the sense
there are more applications to target and a stupid one can reveal the
private key?
Or can there be other attacks posssible
Thanks,
Sudharsan
___
Title: FW: The *right* way to get "-g" in compiler options
It would appear that the *right* way is to simply stick the '-g' option in the config argument list,
./config -g …
I thought it would be easy… :-)
rnd
-Original Message-
From: Diffenderfer, Randy
Sent: Monday,
Title: The *right* way to get "-g" in compiler options
Folks,
This should be easy!
What is the *right* way to include the "-g" option in CFLAG when building openssl-0.9.8b?
I have several undoubtedly *wrong* ways I can choose, but I'd rather take the high road here…
Thanks,
rnd
On Mon, Jun 05, 2006, Stefan Vatev wrote:
> What I want is only the nonce, not the whole ASN1 structure.
> I don't know which is the best way to parse it.
>
>
> First, I get the X509_EXTENSION from the OCSP_RESPONSE
>
> bs = OCSP_response_get1_basic(response)
>
> resp_idx = OCSP_BASICRESP_get_
What I want is only the nonce, not the whole ASN1 structure.
I don't know which is the best way to parse it.
First, I get the X509_EXTENSION from the OCSP_RESPONSE
bs = OCSP_response_get1_basic(response)
resp_idx = OCSP_BASICRESP_get_ext_by_NID(bs,
NID_id_pkix_OCSP_Nonce, -1)
resp_ext = OCSP_B
Is u r private key in a separate .pem file if it is not, first ensure
that...
Jeremiah Foster wrote:
Hello,
I am building an OpenSSL application to process credit cards. I am
testing the server implementation with the OpenSSL command line tool
like this;
$ openssl s_client -connect secure.inc
On Mon, Jun 05, 2006, Jeremiah Foster wrote:
> Hello,
>
> I am building an OpenSSL application to process credit cards. I am
> testing the server implementation with the OpenSSL command line tool
> like this;
>
> $ openssl s_client -connect secure.incab.se/verify/server/click:443
> -cert trusted
Hello,
> I am building an OpenSSL application to process credit cards. I am
> testing the server implementation with the OpenSSL command line tool
> like this;
>
> $ openssl s_client -connect secure.incab.se/verify/server/click:443
> -cert trusted.cer
>
> The error I receive is;
> unable to load
Hello,
I am building an OpenSSL application to process credit cards. I am
testing the server implementation with the OpenSSL command line tool
like this;
$ openssl s_client -connect secure.incab.se/verify/server/click:443
-cert trusted.cer
The error I receive is;
unable to load client certificat
I will be out of the office starting Fri 06/02/2006 and will not return
until Wed 06/07/2006.
I will respond to your message when I return.
__
OpenSSL Project http://www.openssl.org
User Support M
hi all
i am generating a self-signed certificate.
is there a way to keep subject distinguished name EMPTY ??
best
tanish
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
What is the easiest way of making a deep copy of
OCSP_RESPONSE. This is what I've thought of:
bio = BIO_new(BIO_s_mem())
i2d_OCSP_RESPONSE_bio(bio, (OCSP_RESPONSE*)response1)
response2 = OCSP_RESPONSE_new())
d2i_OCSP_RESPONSE_bio(bio, (OCSP_RESPONSE**)&response2)
Is there a better solution
12 matches
Mail list logo