(I avoid HTML on lists, but editting this back to plaintext was too hard,
sorry)
_
From: owner-openssl-us...@openssl.org
[mailto:owner-openssl-us...@openssl.org] On Behalf Of ikuzar
Sent: Wednesday, 09 March, 2011 08:38
To: openssl-users@openssl.org
Subject: Re: convert x509 cert into st
> From: owner-openssl-us...@openssl.org On Behalf Of Jaquez Jr, Hector
L.
> Sent: Wednesday, 09 March, 2011 18:08
> Let me be a little more specific on what I am needing here.
> I am accessing a management console from my desk via IE [and get]
> "There is a problem with
Thanks for quick response.
Adding -purpose any surely works.
I had to change my code to get certs from PKCS7 structure and create X509 store
context and set purpose to X509_PURPOSE_ANY.
This approach works.
But was wondering if it is problem with certificates or with openssl API itself.
Curren
On Thu, Mar 10, 2011, prk j wrote:
>
> Hi,
>
> I am new at using openssl API's. Here is my situation.
>
> I have following set of certificates with X509 extensions defined for code
> signing in PKCS#7 format.
>
> Root CA - Key usage (critical): Certificate Sign, CRL Sign
> CVC Sub- CA - Key u
Hi,
I am new at using openssl API's. Here is my situation.
I have following set of certificates with X509 extensions defined for code
signing in PKCS#7 format.
Root CA - Key usage (critical): Certificate Sign, CRL Sign
CVC Sub- CA - Key usage (critical): Certificate Sign, CRL Sign
CVC cert - K
Hi there,
in the past we have implemented some templates for x509v3
extensions for certificates due to being able to handle
some attributes defined in common-pki 2.0.
One of the more structured attributes is admission:
id-isismtt-at-admission OBJECT IDENTIFIER ::= {id-isismtt-at 3}
id-isismtt-a
On Tue, Mar 8, 2011 at 8:25 AM, Dr. Stephen Henson wrote:
> On Mon, Mar 07, 2011, Kyle Hamilton wrote:
>
>> In order to achieve compliance, you must follow the instructions in the
>> Security Policy to the letter.
>>
>> This means that you must:
>> - download and read the security policy
>> - dow
Is there any option to listen ocsp server in ipv4 address?
--
View this message in context:
http://old.nabble.com/why-ocsp-server-application-in-latest-openssl-1.0.0c-listens-on-ipv6-address--tp31114964p31114964.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
__