I've had problems with certificates
and Cisco if any of the keys in the chain are greater than 2048 This includes
the CA
ray v <[EMAIL PROTECTED]>
Sent by: [EMAIL PROTECTED]
05/12/2005 01:16 AM
Please respond to
openssl-users@openssl.org
To
openssl-users@openssl.org
cc
Subject
C
Hello,
I trying to generate a CSR using openssl
and submitting it to a MS CA. I'm using 0.9.7e
What I get is a ASN1 bad tag value met
ASN:267 I'm creating this CSR using the code in demos\X509.
I can create a CSR using the command
line and that works OK but not using mkreq.c
Both file parse corr
Hi,
I'm writing a program that should:
Generate openssl RSA key pair
Generate a openssl CSR
Use the MS ICertRequest control
to sign it
Get the signed certificate back
Package the private key and
cert into a P12 file using openssl
Everything is fine until 3 when I send
it to the CA. The request
How about L2TP and IPSec
Feature Description PPTP/ L2TPL2TP/
IPSec IPSec
PPP PPP IPSec
Xport Tunnel
User Authentication Can authenticate
the user that is
Test
If you mean the 1.3.6... part try http://www.alvestrand.no/objectid
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Rosario Riccio
Sent: Friday, September 01, 2000 4:13 AM
To: openssl-users
Subject: R: Generate a cert with certenr3.dll
Hi...
Thanks ver
HHMMSS and I believe followed by a Z for Zulu(GMT) time
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Joe Manning
Sent: Thursday, July 20, 2000 10:58 AM
To: [EMAIL PROTECTED]
Subject: Re: Geting certificate expiration date
This should work but
You need the M$ Macro Assembler in your path. I don't think it comes
with the regular OS. You may need to go to the web and download it.
Mark S.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Harry Ng
Sent: Tuesday, July 18, 2000 1:34
A bit outdated but still useful is
http://www.columbia.edu/~ariel/ssleay/. BTW it looks like ariel may not
be at Columbia anymore so I don't know how long these will be available.
Mark S.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]
http://www.rsasecurity.com/rsalabs/faq/ might be a good start.
Mark S
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Gotfried, Colette
Sent: Thursday, July 06, 2000 1:39 PM
To: '[EMAIL PROTECTED]'
Subject: Call
I think this will work
openssl ca -verbose -policy policy_anything -out newcert.pem -infiles
csr.pem
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Gregory Nicholls
Sent: Friday, June 16, 2000 2:23 PM
To: [EMAIL PROTECTED]
Subject: embarrassing questi
In the January issue of Computer Security Journal, Carl Ellison and
Bruce
Schneier have article "Ten Risks of PKI: What You're not Being Told
about
Public Key Infrastructure"
It can be found at http://www.counterpane.com/pki-risks.html
It really addresses policy and process issues more than te
12 matches
Mail list logo