won't work
Thanks in advance
Horst
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Thanks my question was already answered my original certificate was not
rfc compliant and so openssl fails to verify it,
thanks anyway
Nicola
Il 25/07/2011 17:22, lists ha scritto:
On 07/19/2011 08:20 AM, Mailing List SVR wrote:
Hi,
I need to verify the attached certificate (cert.bin) and
Il 20/07/2011 19:09, Michael Ströder ha scritto:
Mailing List SVR wrote:
Il 20/07/2011 17:06, Dr. Stephen Henson ha scritto:
On Wed, Jul 20, 2011, Mailing List SVR wrote:
Il 20/07/2011 08:44, Mailing List SVR ha scritto:
Hi,
openssl seems unable to verify the attacched sod.pem, other pem
Il 20/07/2011 17:06, Dr. Stephen Henson ha scritto:
On Wed, Jul 20, 2011, Mailing List SVR wrote:
Il 20/07/2011 08:44, Mailing List SVR ha scritto:
Hi,
openssl seems unable to verify the attacched sod.pem, other pem
file works fine there is something strange with the one attached,
attached
Il 20/07/2011 08:44, Mailing List SVR ha scritto:
Hi,
openssl seems unable to verify the attacched sod.pem, other pem file
works fine there is something strange with the one attached, attached
is also the binary cert from which I extracted the pem, I have the
following:
openssl smime
Hi,
openssl seems unable to verify the attacched sod.pem, other pem file
works fine there is something strange with the one attached, attached is
also the binary cert from which I extracted the pem, I have the following:
openssl smime -verify -in sod.pem -inform pem -noverify > sod.data
Verif
Hi,
I need to verify the attached certificate (cert.bin) and read the asn1
info stored in it. I'm using the following commands:
openssl smime -verify -in cert.pem -inform pem -CAfile "signer.pem" >
cert.data
and then:
openssl asn1parse -inform DER -in cert.data
now if the signer give me "
Hi,
I need to verify the attached certificate (cert.bin) and read the asn1
info stored in it. I'm using the following commands:
openssl smime -verify -in cert.pem -inform pem -CAfile "signer.pem" >
cert.data
and then:
openssl asn1parse -inform DER -in cert.data
now if the signer give me "
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager [EMAIL PROTECTED]
ctions are being used during
the handshake.
Can anyone help me?
Thank you in advance.
Gallie
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@o
Hi all,
I'm writing Windows clients and servers that don't allow access to the
bare socket so searched on the list and the web for help and have ended
up with some code that uses two memory BIO's and a filter BIO to push
data through the SSL.
Something like:
m_pIn = BI
Any
help would be much appreciated.
--cameron
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager
://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
13 matches
Mail list logo