RE: convert x509 cert into string and store certs in cache

2011-03-10 Thread Dave Thompson
(I avoid HTML on lists, but editting this back to plaintext was too hard, sorry) _ From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of ikuzar Sent: Wednesday, 09 March, 2011 08:38 To: openssl-users@openssl.org Subject: Re: convert x509 cert into st

RE: Installing a .cer file in IE

2011-03-10 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Jaquez Jr, Hector L. > Sent: Wednesday, 09 March, 2011 18:08 > Let me be a little more specific on what I am needing here. > I am accessing a management console from my desk via IE [and get] > "There is a problem with

RE: Question regarding PKCS7_verify

2011-03-10 Thread prk j
Thanks for quick response. Adding -purpose any surely works. I had to change my code to get certs from PKCS7 structure and create X509 store context and set purpose to X509_PURPOSE_ANY. This approach works. But was wondering if it is problem with certificates or with openssl API itself. Curren

Re: Question regarding PKCS7_verify

2011-03-10 Thread Dr. Stephen Henson
On Thu, Mar 10, 2011, prk j wrote: > > Hi, > > I am new at using openssl API's. Here is my situation. > > I have following set of certificates with X509 extensions defined for code > signing in PKCS#7 format. > > Root CA - Key usage (critical): Certificate Sign, CRL Sign > CVC Sub- CA - Key u

Question regarding PKCS7_verify

2011-03-10 Thread prk j
Hi, I am new at using openssl API's. Here is my situation. I have following set of certificates with X509 extensions defined for code signing in PKCS#7 format. Root CA - Key usage (critical): Certificate Sign, CRL Sign CVC Sub- CA - Key usage (critical): Certificate Sign, CRL Sign CVC cert - K

DIRECTORYSTRING and substitute in v1.0.0d

2011-03-10 Thread Christian Weber
Hi there, in the past we have implemented some templates for x509v3 extensions for certificates due to being able to handle some attributes defined in common-pki 2.0. One of the more structured attributes is admission: id-isismtt-at-admission OBJECT IDENTIFIER ::= {id-isismtt-at 3} id-isismtt-a

Re: FIPS compliance question regarding openssl distributions

2011-03-10 Thread Alexander Sack
On Tue, Mar 8, 2011 at 8:25 AM, Dr. Stephen Henson wrote: > On Mon, Mar 07, 2011, Kyle Hamilton wrote: > >> In order to achieve compliance, you must follow the instructions in the >> Security Policy to the letter. >> >> This means that you must: >> - download and read the security policy >> - dow

why ocsp server application in latest openssl 1.0.0c listens on ipv6 address?

2011-03-10 Thread sajualways
Is there any option to listen ocsp server in ipv4 address? -- View this message in context: http://old.nabble.com/why-ocsp-server-application-in-latest-openssl-1.0.0c-listens-on-ipv6-address--tp31114964p31114964.html Sent from the OpenSSL - User mailing list archive at Nabble.com. __