Hi
I am using the following version of openssl -
"openssl-0.9.8b-8.3.tlsext" in the CentOS 5 environment. Whenever
non-local user logs into the box [ not a system created user ] and
logs out sshd segfaults with the following message in
/var/log/messages.
sshd[9250]: segfault at d7bcbc6c r
Hi
I try to Google for openssl x509 -purpose, but no information at all.
What is that ?? I try this command and it gives me :
Certificate purpose:
SSL client : yes
SSL client CA: no
SSL server : no
SSL server CA: no
Netscape SSL server: No
Netscape SSL server CA: No
S/MINE signing: YES
S/MINE sig
Hello,
> My program work fine with my own cert/private key, but give the
> following error if I load with real supposed certificate at client
> program.
>
> ~Error with certificate at depth: 0
>issuer = /DC=dev/DC=jwrn/CN=JWRN Development
>subject = /DC=dev/DC=jwrn/CN=Users/CN=mon
> erro
So my questions are, how do I replicate what load_key() to populate
pkey (EVP_PKEY *)? And, are they any data functions that can be used
to replace what the BIO functions do for files?
The BIO routines work with strings as well as with files.
BIO *rbio;
rbio = BIO_new_mem_buf(str,
Thank You Marek
My program work fine with my own cert/private key, but give the
following error if I load with real supposed certificate at client
program.
~Error with certificate at depth: 0
issuer = /DC=dev/DC=jwrn/CN=JWRN Development
subject = /DC=dev/DC=jwrn/CN=Users/CN=mon
error 26:un
Hello,
> I have a couple CA certificates and couple Cert/Private keys. What
> command in openssl allow me to see what Cert/Private keys belong to
> what CA ??
To find certificate and private key pair:
$ openssl x509 -in vpn-server-crt.pem -modulus -noout
Modulus=DDACB7ED10A3AE69E7FB0320471C0C3F
Hi All
I have a couple CA certificates and couple Cert/Private keys. What
command in openssl allow me to see what Cert/Private keys belong to what
CA ??
Please help.
Thank You
Thao Dinh
Hi everyone,
First I will admit being new to the list.
I am trying to solve a technical problem and I believe I have one last
piece to resolve. I know that from the command line I can duplicate
what I need to do using the commands:
openssl rsautil -encrypt -inkey pub.key etc
openssl rsautil -d
Carles Fernandez i Julia wrote:
En/na Nils Larsch ha escrit:
Carles Fernandez i Julia wrote:
...
That's the point : I have the private key certificate stored in the
smartcard, not located in a plain file. That's why I commented the line
above.
the engine doesn't support using certificates stor
David Latil wrote:
The problem: we simply have a web application running that we are
trying to provide encryption and authentication. An idea was pitched
of a proxy of sorts that would allow not just http traffic, but
others through this tunnel securely. It was pitched specifically as
ssh over
Hecber Cordova wrote:
I'm trying to decrypt with openssl some encrypted files coming from
.NET 2.0. The problem is .NET uses PKCS#7 Padding and openssl uses
PKCS#5 Padding.
It's the same thing. The other padding is ISO padding, also used within
xml-enc.
__
The problem: we simply have a web application running that we are trying to
provide encryption and authentication. An idea was pitched of a proxy of sorts
that would allow not just http traffic, but others through this tunnel
securely. It was pitched specifically as ssh over ssl and the custom
Hi all,
I am trying to debug through OpenSSL using DDD. The functionality I
want to look at is that resulting from:
openssl genrsa -engine cryptodev
Basically I want to see where the engine functions get called and what
parts of the RSA functionality remain in OpenSSL and what parts are
offload
En/na Nils Larsch ha escrit:
> Carles Fernandez i Julia wrote:
> ...
>> That's the point : I have the private key certificate stored in the
>> smartcard, not located in a plain file. That's why I commented the line
>> above.
>
> the engine doesn't support using certificates stored on smart cards
>
Hello,
--On Juli 03, 2007 13:31:27 +0530 Vishal V <[EMAIL PROTECTED]> wrote:
Many thanks for the information.
But my query is partially answered.
Here it goes
A) Doesn't client need server's self-signed certificate to validate the
transmitted certificate?
- Is Question A is true then how to
Many thanks for the information.
But my query is partially answered.
Here it goes
A) Doesn't client need server's self-signed certificate to validate the
transmitted certificate?
- Is Question A is true then how to obtain this certificate.
- Also how to configure this certificate for use at t
16 matches
Mail list logo