It's working now,
Thanks a lot Steve!!!
Rogerio
On Jan 23, 2014, at 22:55 , Dr. Stephen Henson wrote:
> On Thu, Jan 23, 2014, Rogerio Saulo wrote:
>
>> OK, I Understand now...but cannot make it work...
>>
>> I tried this, but without success :
>>
>>int id_spq_ets_uri = OBJ_create("1.2.
On Thu, Jan 23, 2014, Rogerio Saulo wrote:
> OK, I Understand now...but cannot make it work...
>
> I tried this, but without success :
>
> int id_spq_ets_uri = OBJ_create("1.2.840.113549.1.9.16.5.1",
> "id_spq_ets_uri", "id_spq_ets_uri");
> pQInfo->pqualid = OBJ_nid2obj(id_spq_ets_uri);
OK, I Understand now...but cannot make it work...
I tried this, but without success :
int id_spq_ets_uri = OBJ_create("1.2.840.113549.1.9.16.5.1",
"id_spq_ets_uri", "id_spq_ets_uri");
pQInfo->pqualid = OBJ_nid2obj(id_spq_ets_uri);
pQInfo->d.other = ASN1_TYPE_new();
char *urlPolit
On Thu, Jan 23, 2014, Rogrio Saulo wrote:
> Hi all,
>
> Sorry if it as a stupid question but...
>
> I'm trying to add an custom policy qualifier attribute with another NID
> different from NID_id_qt_cps to an PKCS7 envelope.
>
> If I use the NID_id_qt_cps all works fine, BUT if I change the N
Hi Steve,
First thanks for the quick response.
Well, this function is mine, it's not the problem. you can see the function
below :
int POLICY_add_attrib(PKCS7_SIGNER_INFO *si, POLICYINFO *pInfo) {
ASN1_STRING *seq;
unsigned char *p, *pp ;
int len;
len
On Thu, Jan 23, 2014, Rogrio Saulo wrote:
> Hi all,
>
> Sorry if it as a stupid question but...
>
> I'm trying to add an custom policy qualifier attribute with another NID
> different from NID_id_qt_cps to an PKCS7 envelope.
>
> If I use the NID_id_qt_cps all works fine, BUT if I change the N
Hi all,
Sorry if it as a stupid question but...
I'm trying to add an custom policy qualifier attribute with another NID
different from NID_id_qt_cps to an PKCS7 envelope.
If I use the NID_id_qt_cps all works fine, BUT if I change the NID to another
created by OBJ_create the program crashes at
On 1/23/2014 4:55 PM, Sean Langley wrote:
Hi All,
I have been using AES 256, CTR mode to encrypt the contents of a file on
disk. The IV for the file is written to the first 16 bytes followed by
the encrypted file data. Up to now, this encrypted data is created with
a single encryption session.
On Thu, Jan 23, 2014, Russell Leake wrote:
> Dr. Henson,
>
>I'm trying to understand the status of a thread (noted at the bottom of
> this e-mail) in which you recommend a patch to fix an issue that various
> people (including myself) incur with using openssl dgst with an external
> engine.
Dr. Henson,
I'm trying to understand the status of a thread (noted at the bottom of
this e-mail) in which you recommend a patch to fix an issue that various
people (including myself) incur with using openssl dgst with an external
engine. It seems that the patch has been applied to certain bran
Hi All,
I have been using AES 256, CTR mode to encrypt the contents of a file on
disk. The IV for the file is written to the first 16 bytes followed by the
encrypted file data. Up to now, this encrypted data is created with a
single encryption session. This is all on a mobile device, using FIPS
On Thu, Jan 23, 2014, Viktor Dukhovni wrote:
> On Thu, Jan 23, 2014 at 02:06:53PM +0100, Dr. Stephen Henson wrote:
>
> > On Wed, Jan 22, 2014, wizzbert wrote:
> >
> > You need to set the EC_KEY to use the named curve option which isn't the
> > default. You can do that with:
> >
> > EC_KEY_set_a
On Thu, Jan 23, 2014 at 02:06:53PM +0100, Dr. Stephen Henson wrote:
> On Wed, Jan 22, 2014, wizzbert wrote:
>
> You need to set the EC_KEY to use the named curve option which isn't the
> default. You can do that with:
>
> EC_KEY_set_asn1_flag(eckey, OPENSSL_EC_NAMED_CURVE);
I think the below al
On Wed, Jan 22, 2014, wizzbert wrote:
>
> Below is my call stack. Using this, I get a lot of extra information in the
> CSR that is not needed, below the call stack. I think the "extra" data is
> actually incorrect and I do not need it as part of the CSR. Is there a way I
> can just cut off this
On 01/22/2014 11:40 PM, Dave Thompson wrote:
Originally it meant the connection is terminated *abnormally* by the other
end,
as opposed to a normal/graceful FIN exchange. Windows sends RST if an
application crashes, but all Unixes I have seen do FIN, unless the
application
forces RST by setting
Hello Everyone,
I have not explored the openssl much, but just wanted to check the
following things,
1. Using openssl , is it possible to setup CA which can listen to CertReq
coming from the clients.(Cert Reqs are usually sent in HTTP payload) and
sends CertResponse.
2. Using openssl, is it poss
Please ignore, it is just spam
On Wed, Jan 22, 2014 at 5:56 PM, Keshav Nair wrote:
>
>
> _
> http://demo.simple2solutions.com/download/opatip.php
>
>
>
>
>
> kload1
>
I am using openssl 1.0.1e and attempting to generate a CSR. In this case we
are generating our own key pair and will sign independently, so I can't have
openssl generate the key pair and then sign for me. This is all within an
embedded device, so making the calls to the x509_req.
I have the public
18 matches
Mail list logo