> From: owner-openssl-us...@openssl.org On Behalf Of Akos Vandra
> Sent: Tuesday, 14 July, 2009 13:34
> I am trying to decode the CertificateVerify structure, but have thus
far failed.
> I have access to both client and server keys, and have sniffed their
communication,
>
Rij wrote:
> getsockopt fails with the message: "Invalid argument" which is EINVAL.
Which means that one of the arguments is invalid.
> next. What argument is invalid? The only thing that I am suspicious
> about is the socket descriptor. Is it ok? optval and optlen are both
> int.
Did you set
Hi All,
I am trying to write a non-blocking client. Based on previous threads
that I have read on this forum, I have adopted the following strategy.
1) Get a new BIO object.
2) I set the BIO to be non-blocking. As I understood from the manual,
I set it to non-blocking just before calling BIO_do_c
On Thu, 2009-07-16 at 13:50 -0700, Kyle Hamilton wrote:
> Create sub-CAs for each purpose, and have each device only
> authenticate its own CA's stuff (by making that subCA the CAfile).
> The root is a convenience at that point to be able to authenticate the
> entire chain of anything produced by i
Create sub-CAs for each purpose, and have each device only
authenticate its own CA's stuff (by making that subCA the CAfile).
The root is a convenience at that point to be able to authenticate the
entire chain of anything produced by it.
-Kyle H
On Wed, Jul 15, 2009 at 11:29 PM, stortoaranci wrot
On Wed, Jul 15, 2009, stortoaranci wrote:
>
> Hi All,
>
> I just have a silly question on Openssl.
>
> I use a self-signed CA to sign several server/clients cert.
>
> For example I could use signed certs to implement an OpenVPN LAN and one
> Wi-FI RADIUS auth for different clients.
>
> The qu
Openssl can't do this yet. You may write it yourself.
2009/5/31 tito
> how do I sign a certificate in openssl with the CRMF string generated from
> mozilla .
>
The length of data to encrypt is limited depends on the key size you used,
so that you can not encrypt all text by openssl_public_encrypt() simply.
To do this you should reference to 'S/MIME'.
2009/7/14 mahendra [MinG]
> Hi, i am developing a secure email application whereby the email sent to
>
you have to gererate private key previously.
2009/7/16 sdc186
>
> Hello Everyone,
>
> I am using openssl 0.9.8g. Can anybody tell me how to generate public key
> in
> openssl. Which command should I use for the generation?
>
> Thanks.
> --
> View this message in context:
> http://www.nabble.com/
stortoaranci wrote:
> Hi All,
>
> I just have a silly question on Openssl.
>
> I use a self-signed CA to sign several server/clients cert.
>
> For example I could use signed certs to implement an OpenVPN LAN and one
> Wi-FI RADIUS auth for different clients.
>
> The question is: "how to be sure
Hi All,
I just have a silly question on Openssl.
I use a self-signed CA to sign several server/clients cert.
For example I could use signed certs to implement an OpenVPN LAN and one
Wi-FI RADIUS auth for different clients.
The question is: "how to be sure that a client allowed to use the wifi
Hello Everyone,
I am using openssl 0.9.8g. Can anybody tell me how to generate public key in
openssl. Which command should I use for the generation?
Thanks.
--
View this message in context:
http://www.nabble.com/RE%3A-Public-Key-generation.-tp24506389p24506389.html
Sent from the OpenSSL - Use
12 matches
Mail list logo