Here is an OpenSSL command that I have had success with this in the
past.
openssl req -new -out certreq.pem -subj
'/C=US/ST=Arizona/L=City/O=Organization/CN=My Common Name' -passout
pass:password
Of course this certificate request needs to be signed by the CA to
become a valid certificate
ope
Here is an OpenSSL command that I have had success with this in the
past.
openssl req -new -out certreq.pem -subj
'/C=US/ST=Arizona/L=City/O=Organization/CN=My Common Name' -passout
pass:password
Of course this certificate request needs to be signed by the CA to
become a valid certificate
ope
"Ian jonhson" <[EMAIL PROTECTED]> wrote on 07/08/2007 02:16:38:
> "Network security with OpenSSL":
> http://www.oreilly.com/catalog/openssl/index.html
>
> is recommended by some friends in mail-list
>
>
> On 8/7/07, acrisio domiciano dias <[EMAIL PROTECTED]> wrote:
> > Hi everybody,
> >
> > I'
--On August 08, 2007 08:24:10 +0200 Piotr Skwarna <[EMAIL PROTECTED]>
wrote:
Hello
Hello Piotr,
I have problem with openssl cooperating with nCipher (nShield F3) engine
bash-2.03# uname -a
SunOS sun250 5.8 Generic_117350-35 sun4u sparc SUNW,Ultra-250
bash-2.03# ./openssl speed rsa -eng
I made a "self-serve" model with a simple form POST and a script - I
received four input parameters and assembled a text file and passed the
parameters to the script:
REM set the basic configuration parameters
set OPENSSL_CONF=C:\OpenSSL\bin\OpenSSL.cnf
REM %1 is emailAddress, %2 is password,
> Hi,
>
> while creating certificate requests using openssl, one is prompted for
> some information like Country name, Sate, Locality name etc.
> Though these parameters have defaults set, one has to hit return to move
> ahead.
>
> Is there a way to achieve this without being prompted for any infor
Hello,
>
> while creating certificate requests using openssl, one is prompted for
> some information like Country name, Sate, Locality name etc.
> Though these parameters have defaults set, one has to hit return to
> move ahead.
>
> Is there a way to achieve this without being prompted for any
>
Hi,
while creating certificate requests using openssl, one is prompted for some
information like Country name, Sate, Locality name etc.
Though these parameters have defaults set, one has to hit return to move ahead.
Is there a way to achieve this without being prompted for any information
(eith
Hi *,
Sorry for having annoyed you. When I looked at my cert by openssl-means I saw
the appropriate GOST R 34.11-94 hash algorithm in all my certs. So what I
observed is a bug in the M$ certificate viewer.
They just should not say "it's sha1", if they don't know the object identifier.
Regards
Hello,
> I am working on TLS Authentication using OpenSSL 0.9.8a.
>
> When I am trying for Mutual Authentication, the OpenSSL throws "tlsv1
> alert protocol version" followed by "ssl handshake failure".
>
> Can anybody explain me, what exactly this problem is?
>
> Log :
>
> DEBUG-> [Wed Aug 08
Hi,
Playing with GOST engine in opnessl 0.9.9.
I cannot get a certificate with a GOST hash in it.
I tried several versions of the command line
x509 [(-md5|-md2|-md_gost94|-sha1)] -days 7300 -signkey
/home/ziermann/gostpki/rootca/private/cakey.pem -in
/home/ziermann/gostpki/rootca/cacert.csr
On 8/8/07, sri dhar <[EMAIL PROTECTED]> wrote:
> hi mahesh,
> openssl version number should be same for both server and
> client.
> if u server or client,check other side openssl version number.update that
> openssl version in your side.then check it...
>
u mean the protocol vers
hi mahesh,
openssl version number should be same for both server and
client.
if u server or client,check other side openssl version number.update that
openssl version in your side.then check it...
Mahesh Dantakale <[EMAIL PROTECTED]> wrote:
Hi all,
I am working on TLS Au
Hi all,
I am working on TLS Authentication using OpenSSL 0.9.8a.
When I am trying for Mutual Authentication, the OpenSSL throws "tlsv1 alert
protocol version" followed by "ssl handshake failure".
Can anybody explain me, what exactly this problem is?
Log :
DEBUG-> [Wed Aug 08 12:38:24][../src/e
14 matches
Mail list logo