Dynamically Adding a New PubKey Method - how to link OID <-> pkey_id ?

2022-08-30 Thread Dr. Pala
stly because I have never had to implement the interface...). Thank you for your help and have a wonderful day! Cheers, Max -- Best Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo

CMS and GCM

2019-05-12 Thread Dr. Pala
a way to list the ciphers supported when using EnvelopedData ? Cheers, Max -- Best Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo

How to Sign and Encrypt in CMS ?

2019-05-05 Thread Dr. Pala
encryption algorithm from the EnvelopedData/EncryptedContentInfo (I can not find the helper function...) ? Cheers, Max -- Best Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo

[openssl-users] How to Implement a new PubKey method correctly

2018-08-22 Thread Dr. Pala
tion) ? Thanks for any help for understanding all these details... :D Cheers, Max -- Best Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo smime.p7s Description: S/MIME Cryptographic Signature -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/l

[openssl-users] d2i_PUBKEY() and X509_get0_pubkey_bitstr() output differences

2018-05-26 Thread Dr. Pala
btain the same values that does not depend on the type or size of the keys ? Is the 24 Bytes a constant size or ... ? Is there any documentation that would help me... ? Cheers, Max -- Best Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo -- openssl-users mailing list To unsubs

Re: [openssl-users] Hashing public keys

2018-03-21 Thread Dr. Pala
Hi Jan, not sure if this might help you, I solved the problem by using X509_PUBKEY + i2d_X509_PUBKEY. Here's an example:     https://github.com/openca/libpki/blob/b87b647170cb5f71e00baffe609f5a02edfa3845/src/openssl/pki_keypair.c#L307 I hope that helps, Cheers, Max On 3/21/18 1:42 PM, Jan Dan

Re: [openssl-users] Certificate Verify and non-root Trust Anchors

2017-12-11 Thread Dr. Pala
Hi Victor, A... that is why :D I wrongly assumed that the newly created parameters would hold the same initialization. This approach works! Thanks again! Cheers, Max On 12/11/17 5:45 PM, Viktor Dukhovni wrote: On Dec 11, 2017, at 7:35 PM, Dr. Pala wrote: Perhaps you ended up

Re: [openssl-users] Certificate Verify and non-root Trust Anchors

2017-12-11 Thread Dr. Pala
Hi Victor, does it matter that we are not in the TLS case (maybe the code is different in the SSL_CTX ) ? I am just trying to validate the chain with the TA set to the SubCA... :D IMHO, the correct (or, better, the expected) behavior (from a developer's standpoint) would be to trust keys in

Re: [openssl-users] Certificate Verify and non-root Trust Anchors

2017-12-11 Thread Dr. Pala
Hi Victor, On 12/11/17 4:18 PM, Viktor Dukhovni wrote: [...] Perhaps you ended up creating a parameter structure with a depth limit that's too small.  Just configuring partial chains will never yield a chain that is longer than it otherwise would be.  In fact you generally get shorter chains. 

Re: [openssl-users] Certificate Verify and non-root Trust Anchors

2017-12-11 Thread Dr. Pala
code yet... ... any suggestion on how to fix this ? Do you think it is actually a bug ? ... or am I missing some other configs / setting I should have done for the verify param ? Cheers, Max On 12/11/17 3:18 PM, Viktor Dukhovni wrote: On Dec 11, 2017, at 5:06 PM, Dr. Pala wrote: Hi all

[openssl-users] Certificate Verify and non-root Trust Anchors

2017-12-11 Thread Dr. Pala
in the trusted stack or not... Maybe there are flags / trust settings that can be used instead ? Cheers, Max -- Best Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo smime.p7s Description: S/MIME Cryptographic Signature -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

[openssl-users] Windows OpenSSL's FIPS Binaries

2017-12-07 Thread Dr. Pala
Hi all, does anybody know if there are downloadable binaries of openssl-fips and/or openssl-fips-ecp (2.0.16 or earlier) for Windows ? Cheers, Max -- Best Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo smime.p7s Description: S/MIME Cryptographic Signature -- openssl

Re: [openssl-users] ASN1 & Recursive Structures definition

2017-12-03 Thread Dr. Pala
er, I guess I will have to either change the envisioned approach (maybe introducing an intermediate data structure of some kind..?) or use the ASN1_ANY approach. Cheers, Max On 12/2/17 4:54 AM, Richard Levitte wrote: In message on Fri, 1 Dec 2017 20:22:09 -0700, "Dr. Pala" said:

Re: [openssl-users] ASN1 & Recursive Structures definition

2017-12-01 Thread Dr. Pala
17 12:14:54 -0700, "Dr. Pala" said: director> I am trying to define an ASN1 structure similar to this: director> director> ASN1_SEQUENCE(TEST) = { director> ASN1_SIMPLE(TEST, version, ASN1_INTEGER), director> ASN1_EXP_SEQUENCE_OF_OPT(TEST, otherTests, TEST, 0

[openssl-users] ASN1 & Recursive Structures definition

2017-12-01 Thread Dr. Pala
est Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] Block Ciphers in XTS mode (AES-XTS) [SOLVED - almost ?]

2016-04-06 Thread Dr. Pala
re ? Am I supposed to, somehow, modify the plaintext before encrypting it (e.g., XOR with the block number ?). Thanks, Max P.S.: I am cross-posting the message also to dev as this might have better chances to get an answer there... ? On 4/6/16 10:54 AM, Dr. Pala wrote: Hi all, I am trying

[openssl-users] Block Ciphers in XTS mode (AES-XTS)

2016-04-06 Thread Dr. Pala
Pala, PhD Director at OpenCA Labs twitter: @openca -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

[openssl-users] Fwd: [saag] Standard Crypto API + Symmetric Crypto At Rest

2015-11-11 Thread Massimiliano Pala
effort. Any comments and feedback are welcome (positive and negative alike). Cheers, Max Forwarded Message Subject:[saag] Standard Crypto API + Symmetric Crypto At Rest Date: Sat, 7 Nov 2015 22:30:35 +0900 From: Massimiliano Pala Organization: OpenCA Labs To

[openssl-users] SOLVED --- ASN.1: Parsing a 'context-specific' class (or app/private class)

2015-09-02 Thread Massimiliano Pala
n the same path :) Your solution will be indexed and pop right up on search engines in the future. Thanks! Sent from my mobile On Aug 31, 2015, at 7:10 PM, Massimiliano Pala wrote: Hi all, I actually figured it out, if anybody is curious about the solution for parsing this CRYPTLIB signat

Re: [openssl-users] ASN.1: Parsing a 'private' class

2015-08-31 Thread Massimiliano Pala
Hi all, I actually figured it out, if anybody is curious about the solution for parsing this CRYPTLIB signature envelope (in this case DSA) - write to me directly, I will be happy to share the solution. Cheers, Max On 8/29/15 6:56 PM, Massimiliano Pala wrote: Hi all, I am trying to parse

[openssl-users] ASN.1: Parsing a 'private' class

2015-08-29 Thread Massimiliano Pala
Hi all, I am trying to parse a sequence that has, after an integer, a 'private' (xclass) item. I was wondering what is the right templates / macros to be able to generate the ASN1 functions with the usual macro. An example of the structure I have to parse (B64 - DER), is the following: MGICA

[openssl-users] Fast DH parameters generation

2015-06-16 Thread Massimiliano Pala
Hi all, I am working on an application that would use DH to allow exchanging symmetric keys (not a TLS app), and we noticed that we could use two different approaches to generate the parameters. The first option is to use the DH_generate_parameters_ex() + DH_generate_key() - but that takes q

OpenSSL on Win => Thread Safety

2010-06-24 Thread Massimiliano Pala
Hi all, I have a question for Win coders.. I am porting LibPKI, which is based on OpenSSL, to Win OSes. On UNiX OSes we used pthread to initialize support for threads in OpenSSL. What is the best practice for Win OS ? Does anybody have some sample code around ? In particular, I am referring to t

Re: SSL and Certificates verification

2010-06-20 Thread Massimiliano Pala
via the X509_STORE_add_cert(). What I would expect is that, in the second case, I would get notified that the certificate is not trusted... Cheers, Max On 06/18/2010 05:04 PM, Peter Sylvester wrote: On 06/18/2010 01:57 AM, Massimiliano Pala wrote: Hi all, I have two issues when I am trying

SSL and Certificates verification

2010-06-18 Thread Massimiliano Pala
Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] ope...@acm.org project.mana...@openca.org Dartmouth Computer Science Dept

SSL and Certificates verification

2010-06-18 Thread Massimiliano Pala
, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] ope...@acm.org project.mana...@openca.org Dartmouth Computer Science Dept

SSL and Certificates verification

2010-06-17 Thread Massimiliano Pala
() ??? -- Best Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] ope...@acm.org project.mana...@openca.org Dartmouth Computer Science

SSL and Certificates verification

2010-06-17 Thread Massimiliano Pala
Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] ope...@acm.org project.mana...@openca.org Dartmouth Computer Science Dept

SSL and Certificates verification

2010-06-17 Thread Massimiliano Pala
, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] ope...@acm.org project.mana...@openca.org Dartmouth Computer Science Dept Home

Re: FIXED - CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-22 Thread Massimiliano Pala
nd HEAD. Cheers, Geoff -- Best Regards, Massimiliano Pala --o---- Massimiliano Pala [OpenCA Project Manager] [EMAIL PROTECTED] [EMAIL PROTECTED] Dartmouth Computer Scienc

FIXED - CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-22 Thread Massimiliano Pala
I have a single file with the code for OpenSSL and pthreads, both static and dynamic locks.. Shall we include it into OpenSSL ? void OpenSSL_pthread_init( void ); .. that would make it more usable for the average developer! :D Later, Max Sander Temme wrote: On Nov 21, 2008, at 8:

Re: CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-22 Thread Massimiliano Pala
s would be nice.. :D I just installed the patched version - but no changes in the behavior.. I will try to inspect the `disable_mutex_callbacks`.. but if that is the case, how shall I fix it ??? Later, Max -- Best Regards, Massimi

Re: CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-22 Thread Massimiliano Pala
Hi Sander, I definitely did - now I do initialize all the static locks in OpenSSL *and* the dynamic functions. But they are never called by the chil - the assert fails and the SIGABRT is sent to my daemon forcing it to exit. For some reason it seems the dynamic locking functions do not function

FIXED - CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-21 Thread Max Pala
I have a single file with the code for OpenSSL and pthreads, both static and dynamic locks.. Shall we include it into OpenSSL ? void OpenSSL_pthread_init( void ); .. that would make it more usable for the average developer! :D Later, Max Sander Temme wrote: On Nov 21, 2008, at 8:

Re: CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-21 Thread Max Pala
Sander Temme wrote: /opt/nfast/toolkits/openssl/openssl098e-patch.txt I found a 'openssl098-patch.txt' is that ok ? Should apply cleanly to newer versions of OpenSSL, with patch -p1. It creates a static lock for CHIL to use so it doesn't need the dynamic ones available. It did. I persona

Re: CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-21 Thread Max Pala
, Max Geoff Thorpe wrote: On Friday 21 November 2008 03:01:33 Massimiliano Pala wrote: Hi David, that is really nice.. although.. after I gave it a try... it does not really work :( Actually, it seems that the dynamic functions are never called... :( Investigating... The attached example seem

Re: CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-21 Thread Max Pala
Hi Sander, I definitely did - now I do initialize all the static locks in OpenSSL *and* the dynamic functions. But they are never called by the chil - the assert fails and the SIGABRT is sent to my daemon forcing it to exit. For some reason it seems the dynamic locking functions do not function

Re: CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-21 Thread Max Pala
Hello Przemek, thanks for the advice - I already tried to use a mutex to protect the OCSP_basic_sign(), but I wanted to avoid it as this will just use only one thread at a time. It seems that nCipher is best used with a simple fork() daemon... if it wasn't for the shared memories, still today

Re: CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-21 Thread Massimiliano Pala
enssl-users@openssl.org Automated List Manager [EMAIL PROTECTED] -- Best Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] [EMAIL PROT

Re: CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-21 Thread Massimiliano Pala
t Manager [EMAIL PROTECTED] -- Best Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] [EMAIL PROTECTED] [EMAIL P

CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-20 Thread Max Pala
to do that by using pthreads ? Ciao, Max Sander Temme wrote: On Nov 19, 2008, at 11:24 PM, Max Pala wrote: The software that I am writing is a multi-threaded OCSP responder. Please make sure you initialize the engine correctly, and set up your locking callbacks before you actually

Re: Engine Issue: nShield 500

2008-11-20 Thread Max Pala
efc in ?? () #29 0x0807eed8 in ?? () #30 0x08085558 in ?? () #31 0x0010 in ?? () #32 0x in ?? () Any Idea ??? Later, Max Sander Temme wrote: On Nov 19, 2008, at 11:24 PM, Max Pala wrote: The software that I am writing is a multi-threaded OCSP responder. Please make sure you initia

Re: Engine Issue: nShield 500

2008-11-19 Thread Max Pala
Hello Sande, The software that I am writing is a multi-threaded OCSP responder. Sander Temme wrote: What software are you running that makes he calls into OpenSSL? -- Best Regards, Massimiliano Pala --o

Engine Issue: nShield 500

2008-11-19 Thread Max Pala
tas[remember].inuse > 0' failed. Anybody has experienced problems with this HSM on Linux + pThread ? Cheers, Max -- Best Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] [EMAI

Re: OCSP Resources

2008-06-03 Thread pala
No docs, but there is working code here: https://www.openca.org/projects/ocspd/ Best, Max Quoting Brian Smith <[EMAIL PROTECTED]>: Does anyone know of any substantial documentation/coding examples that may be available (similar to the Networking with OpenSSL book) for using OpenSSL as an OC

Re: certificate withou private key

2007-09-30 Thread Massimiliano Pala
ed in a smartcard) but with the public key only? -- Best Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager][EMAIL PROTECTED] [

Re: ASN1_item_sign() / ASN1_item_verify()

2007-09-27 Thread Massimiliano Pala
Hello, thanks :) That was the problem.. I was initializing the library on the server but not on the client. Thanks again! Later, Max Marek Marcola wrote: Do you have OpenSSL library initialized ? Look at man page for SSL_library_init. smime.p7s Description: S/MIME Cryptographic Signatur

Re: ASN1_item_sign() / ASN1_item_verify()

2007-09-26 Thread Massimiliano Pala
the X509_signature_print() I get no errors on both the server and the client... -- Best Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager][EMAIL PROTEC

Re: ASN1_item_sign() - Signing and i2d_ problem :(

2007-09-26 Thread Massimiliano Pala
nzC/i 8otOQZ1gzPDDK53cIbF609hFMoaWmq2e36rIGUHWOl126xu0iKKe8H7HcsqZARf/ NJP9RLofeibFp7gOhO7YjgD6z5ioAjAA -END PRQP RESPONSE- MMm... another error in the ASN1 definition ? Any idea ? Later, Max -- Best Regards, Massimiliano Pala

ASN1_item_sign() - Signing and i2d_ problem :(

2007-09-26 Thread Massimiliano Pala
EM_ASN1_write_bio () from /lib/libcrypto.so.6 #11 0xb7faeecb in PEM_write_bio_PRQP_RESP (bp=0x8088938, o=0x805f6a0) at prqp_bio.c:92 = Anyone can help me ? It is quite strange behavior -- I am missing something, but I have no

Re: experiences with CRL's Ldap

2005-01-31 Thread Massimiliano Pala
th. Is openldap suitable for serving up CRL's of this size and bigger? Is there anyone doing this succesfully? There is no problem with CRLs that size, indeed we successfully use OpenLDAP with CRLs which are 50MB+ in size... -- Best Regards, M

Re: LIBEAY32.dll

2004-12-27 Thread Massimiliano Pala
the library in the system folder. -- Best Regards, Massimiliano Pala --o---- Massimiliano Pala [OpenCA Project Manager] [EMAIL PROTECTED] Tel.: +39 (0)11 564 7081

Re: serializing certificates

2004-11-24 Thread Massimiliano Pala
numbers in the certificates is always 0. Any thoughts? If this is the case, use the '-set_serial' option. -- Best Regards, Massimiliano Pala --o---- Massimiliano Pala [OpenCA Project Manag

HSM - Engine

2004-05-28 Thread Massimiliano Pala
more info ? Thank you, bye. -- C'you, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] [EMAIL PROTECTED] Tel.: +39 (0)59 270 094

Re: Creating certificates with more than one eMail address

2004-02-11 Thread Massimiliano Pala
made recently with all major email clients available gave completely different results. Multiple emailAddress entries were not supported while multiple email within subjectAltName usage was supported (not by M$ client). -- C'you, Massimiliano

Re: Creating certificates with more than one eMail address

2004-02-04 Thread Massimiliano Pala
reported in the subjectAltName extension. Multiple emailAddress, anyway, within the DN should be avoided as this format is against the standard and does not add any value over the subjAltName extension usage :-D -- C'you, Ma

Re: VPN help

2003-12-14 Thread Massimiliano Pala
pub/openca/snapshots/ -- C'you, Massimiliano Pala --o----- Dr. Massimiliano Pala [OpenCA Project Manager][EMAIL PROTECTED] Tel.: +39 (0)59 270

Re: Converting PEM cert to DER format

2003-09-19 Thread Massimiliano Pala
and needed pieces for its verification. Usually there is no preferred format because once loaded you actually use its internal rappresentation of the certificate ... my suggestion: if you have DER just use it and forget the PKCS7 - you don't need it to simply manage a certificate. -- C'you,

Re: interoperability

2001-10-29 Thread Massimiliano Pala
l those, i repeate, technically. The easiest way, and most supported by current clients, is to establish a Root CA issuing certificates for sub CAs (hierarchy). It will be possible to recognize and validate sig/certs from the whole chain as the same root is trusted. -- C'you,

Re: Practical CA problem - modified requests

2001-08-24 Thread Massimiliano Pala
has only a key challenge but you can sign the request, in this case, for later verification. -- C'you, Massimiliano Pala --o----- Massimiliano Pala [OpenCA Project Manager]

Re: Request for a -noverify option for openssl ca

2001-04-16 Thread Massimiliano Pala
dified dn () instead of the one within the request. This is also logical because if you alter the request then it is no more valid to verification and you cannot state the authenticity of the request. -- C'you,

Re: Private key decoding

2000-11-27 Thread Massimiliano Pala
tool which can do the same. You can simply remove the password by using: $ openssl rsa -in key.pem -out new-key.pem -passin this should remove the password. Take a look to the rsa tool anyway to check the options... C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Public key generation

2000-11-27 Thread Massimiliano Pala
Deepak Taneja wrote: > > Hello , >Anybody can tell me that which algo is used to generate > client public and private key.? Usually RSA with md5, anyway you can try the DSA as well. C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: .CRT

2000-11-27 Thread Massimiliano Pala
e above... anyway it is usually a .pem formatted file (certificate). C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Expired Certificate in CRL

2000-11-13 Thread Massimiliano Pala
to be present in the CRL till its validity period expiration. If you want to remove the certificate from the crl, simply modify the index.txt file changing the 'R' into 'E' - setting it to expired instead of revoked. C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Certificate renewal

2000-06-27 Thread Massimiliano Pala
erent. Netscape will correctly import it and recognize it is the same certificate (try to display it and you'll get an idea of what I am saying). C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Certificate renewal

2000-06-25 Thread Massimiliano Pala
our original request and issue a new certificate with a new validity period. This almost depends on the crypto layer you are using and policies you are following. If you simply renew the same key-pair just use the old request, but keep in mind that it is a good policy to renew all keys in a 2

Re: "Suspending" certificate

2000-06-19 Thread Massimiliano Pala
actly) reason. I continue to think that a suspension list can be very useful, and, when I get some spare time, I will re-post some messages to the ietf-pkix working group - hopefully I have enought time to submit an rfc... (??) - who knows ... C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Certificates and authorities.

2000-02-25 Thread Massimiliano Pala
arning)? You could simple use a certificate expiring after 30 days. If you still want to use it, simply renew it... C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Building a Corporate CA

2000-01-27 Thread Massimiliano Pala
C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Seeking officers for Free-software-friendly CA

1999-12-23 Thread Massimiliano Pala
by issuing new certificates: sorry... is one of the projects... :-D I know they are rebuilding the hierarchy's root keys... we are waiting to get one CA key to use... :-D C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Production CA needed

1999-12-23 Thread Massimiliano Pala
I think the discussion should be continued on another mailing list :-D This is really OT, here (sorry people) ... If you can/want to continue discussing it, please subscribe to [EMAIL PROTECTED] C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Seeking officers for Free-software-friendly CA

1999-12-22 Thread Massimiliano Pala
"James B. Huber" wrote: > Yes, > But I've never been able to do https with it. Please, try now. C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Seeking officers for Free-software-friendly CA

1999-12-22 Thread Massimiliano Pala
utions offer such service.) I think you got the point (not only for free CAs): real problems, by now, are the Policies definitions and organizational realted rather than crypto/software related. C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Seeking officers for Free-software-friendly CA

1999-12-22 Thread Massimiliano Pala
ect about security/certificates/CAs/etc... Another way of avoiding the problem is: before applying for a request, the user is asked to import the certificate just before submitting data (required). C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Seeking officers for Free-software-friendly CA

1999-12-22 Thread Massimiliano Pala
th the outworld... we are currently working on it (but we have to wait for the network responsables... *GRIN*). Sorry for the inconvenience. Hope to be on soon. If you want, anyway, you can download the software from any of the mirrors: ftp://sunsite.cnlab-switch.ch C'you,

Re: Certificate Revocation

1999-12-18 Thread Massimiliano Pala
authorization level to actually revoke certificates and proof of it is the knowledge of the CA's password, simply ask for it once, then the program will use that in every "challenge" section (see the ca command about the challenge function... ). C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Certificate Revocation

1999-12-17 Thread Massimiliano Pala
. I can see your point, now. Anyway I don't think it could be not very wise allowing anyone to mark certificates as revoked. Patchin the code does not require much work, but I don't think it should be done. This is my opinion, what the other OpenSSL people think about this ??? C'y

Re: Certificate Revocation

1999-12-17 Thread Massimiliano Pala
e encryption password). So if you don't know the protection password of the CA key you can not issued CRLs ... I don't know if I got your point, I hope so. C' you, Massimiliano Pala ([EMAIL PROTECTED]) __

Re: OpenSSL CA as trusted CA in Netscape browser - help

1999-12-17 Thread Massimiliano Pala
[EMAIL PROTECTED] That could be a VERY BIG problem for the Win people because they can not choose to trust or not the connection: I mean they are not presented with wornings and so on... You should report as a bug to the Netscape people. C'you, Massimiliano

Re: Certificate Revocation

1999-12-15 Thread Massimiliano Pala
knows the ca key passwd should be able do revoke certificates. C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: CRL Distribution Mechanism Evaluation and Considerations

1999-12-06 Thread Massimiliano Pala
l change soon (1 year) as the LDAP support will be added to most of the available applications. I suggest you to consider some other form of certificate validity such as OCSP, SCVP available on the ietf pages (and mailing lists) (www.ietf.org). C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

OPENCA NEW RELEASE AVAILABLE (v0.2.0)

1999-11-16 Thread Massimiliano Pala
Contacts To contact us, please visit our web site where you will find any information on how to send your comments to us. Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

OpenCA Up Again ...

1999-10-16 Thread Massimiliano Pala
, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

NEW DEVELOPMENT RELEASE AVAILABLE SNAP-12-10-1999 (CODE FREEZE)

1999-10-14 Thread Massimiliano Pala
where you will find any information on how to send your comments to us. Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

NEW DEVELOPMENT RELEASE AVAILABLE SNAP-12-10-1999 (CODE FREEZE)

1999-10-11 Thread Massimiliano Pala
To contact us, please visit our web site where you will find any information on how to send your comments to us. Massimiliano Pala ([EMAIL PROTECTED]) S/MIM

Re: What US companies need to know about RSA

1999-09-28 Thread Massimiliano Pala
This is theft. It is just a non-sense. But I admit, this is MY opinion wich is personal and may not be shared. C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

OCSP patch ...

1999-09-18 Thread Massimiliano Pala
7;you, Massimiliano Pala ([EMAIL PROTECTED]) openssl-SNAP-19990907-ocsp.tar.gz S/MIME Cryptographic Signature

Re: New openssl/apps/spkac

1999-09-05 Thread Massimiliano Pala
rity category, and > that will contain a "how-to-build your own ca using openssl", and how to > build it in such a way it will be certified by the SURFnet Policy > Certification Authority. It's all lots of fun :) > > Jan Please subscribe to openca mailing lists and c

Re: New openssl/apps/spkac

1999-09-02 Thread Massimiliano Pala
First rule of the Net: you give one and get 100 in return! I'm happy if I can share my (poor) knoledge with someone else... C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

OpenSSL TryIT (Certs > 122.000 )

1999-08-27 Thread Massimiliano Pala
to_ssl_dir $ ./createindex $index_file_name $number_of_entries Then to check it simple use: $ openssl ca -status $hex_serial_num_of_a_certificate The ca program should work fine. Try it and please report any bug in the patches. Thanks. C'you, Massimiliano Pala ([EMAIL PROTECTED]) #!/u

Re: More: Anybody can help?

1999-08-26 Thread Massimiliano Pala
Dr Stephen Henson wrote: > > The people at OpenCA has developed a patch to ca that enables this behavior, > > but there is no oficial 0.9.4 patch :-( The patches are available now for the 0.9.4. More info on http://www.openca.org C'you, Massimiliano Pala ([EMAIL PR

OpenSSL CA patches (addendum)

1999-06-05 Thread Massimiliano Pala
n your env (because it is necessary only when used) without this patch you should set it or you get an error (either if it is not used). This patch fix this behaviour; Enjoy the patches. C'you, Massimiliano Pala ([EMAIL PROTECTED]) Pat

Re: Bug causing crash on RedHat 6.0 and patch fixing it.

1999-05-15 Thread Massimiliano Pala
SL on various system, dependent on stdio implementation. > I don't know wich version you tryed out, but I am using a SNAP of the 10th of May and sucessfully compiled it on 2 different RH6.0 platforms (with make test). Did you tryed one of latests SNAP ?? C'you,

Re: Linux

1999-05-11 Thread Massimiliano Pala
(not Openssl. If you do not want to risk just to see a very (indeed) GUI, don't install the 6.0 bu use the 5.2. C'you, Massimiliano Pala ([EMAIL PROTECTED]) __ OpenSSL Project

Re: Certificate site?

1999-05-06 Thread Massimiliano Pala
certificate? > If you use a certificate for a web server, netscape checks it for the CN (Common Name) to be the same as the URL used. For example, if your server's address is: http://www.mydomain.com then you have to issue a certificate with: CN=www.mydomain.com, ..

Re: Suggestions for the next OpenSSL-Release

1999-05-06 Thread Massimiliano Pala
$ openssl ca -updatedb a bit longer, but more readable... (I think... ) > I have patched this functionality in the "revoke.c"-file originally > posted long ago by "[EMAIL PROTECTED]" (sorry, can't find his > real name) and

Re: Form to generate certs

1999-04-13 Thread Massimiliano Pala
OpenCA.org when will be available... See you, Massimiliano Pala. S/MIME Cryptographic Signature

Re: How to sign a Netscape PubKey ??

1999-03-08 Thread Massimiliano Pala
h a > special option (-spkac). > > All this is described in the docs (go to the doc/ directory, and look for > a ns-ca.doc file... Thank you for your help... If you want to follow any result... just browse www.openca.org. Th