ec_pmeth.c:331:
-Original Message-
From: Michael Richardson
Sent: Tuesday, September 22, 2020 4:36 PM
To: Yan, Bob
Cc: openssl-users@openssl.org
Subject: Re: ECDSA certificate question
Yan, Bob via openssl-users wrote:
> Is there a way to generate a ECDSA certificate with SM2
Hello everybody,
Is there a way to generate a ECDSA certificate with SM2 typed public key and
ecdsa-with-SM3 as the signature algorithm in openssl 1.1.1x version?
Thank you very much!
Bob
---
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Darren Nay
Sent: Monday, December 05, 2005 5:06 PM
To: openssl-users@openssl.org
Subject: CA certificate question
Hey All,
I am relatively "SSL Stupid" .. self admittedly. :)
I am trying to use a certificate that was assigned
Hey All,
I am relatively "SSL Stupid" .. self admittedly. :)
I am trying to use a certificate that was assigned to me by a company
whom we are working with and I am having some problems and wondering if
I can get some assistance.
I generated a standard 1024 bit RSA private key and CSR and t
Title: Certificate question
Does anyone out there have detailed information on how one could accomplish the following:
Create one OpenSSL certificate that functions as a SERVER Certificate and the Root CA at the same time?
In other words, I go through the process of generating a
i all
I'm trying to generate my fake client certificate for test purposes.
For this I'm using the "make certificate" command under apache (which
is tied to openssl via modssl).
I have a question in the process, when I reach STEP 3 it tells me:
"STEP 3: Generating X.509 certificate signed by Sn
Hi again.
Thanks for your tip.
As you recommended, I took a look at the s_server code, and I found out that
SSL_CTX_set_client_CA_list() function call was missing from my server code.
So I added it, and it worked beautifully.
I really appreciate your help.
Have a great weekend. (Thanks to you, I c
Sejin Choi wrote:
>
> Ah, this is just a sample code just to see if it's working. This is not the
> full version of application code. :)
> While making the sample code, I think I made a mistake to put exit code there.
>
> You're right, it shouldn't.
> But my problem is how to generate/verify the
Ah, this is just a sample code just to see if it's working. This is not the
full version of application code. :)
While making the sample code, I think I made a mistake to put exit code there.
You're right, it shouldn't.
But my problem is how to generate/verify the client certificate if there's an
Sejin Choi wrote:
>
> Hi, all.
> Thanks for all the advices you all gave me on my previous question
> regarding client certficate question.
> I've attached simple client/server code I've been using to establish SSL
> connection between TCP/IP client/server application program.
> Client side verif
Hi, all.
Thanks for all the advices you all gave me on my previous question
regarding client certficate question.
I've attached simple client/server code I've been using to establish SSL
connection between TCP/IP client/server application program.
Client side verified server certificate without an
"Fisher, James" wrote:
>
> That would be great. Could you give me Tobias's email, website etc
>
> JF
>
Here's his mail:
Original Message ----
Subject: Re: Client certificate question relating to Crypt::SSLeay
Date: Wed, 10 Jan 2001 16:16:
Howdy also,
Sure go ahead and give me the download location or send me an email...
Regards,
JF
-Original Message-
From: Tobias Manthey [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, January 10, 2001 10:16 AM
To: [EMAIL PROTECTED]
Subject: Re: Client certificate question relating to Crypt
That would be great. Could you give me Tobias's email, website etc
JF
-Original Message-
From: Joshua Chamas [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, January 10, 2001 12:35 PM
To: Fisher, James; [EMAIL PROTECTED]
Subject: Re: Client certificate question relating to Crypt::S
t: Tuesday, January 09, 2001 12:18 PM
> To: [EMAIL PROTECTED]
> Subject: Re: Client certificate question relating to Crypt::SSLeay
>
> I was sent a patch for this, but have not had time yet to
> integrate it, if you would like it, I can send it on to you.
>
> --Josh
>
&g
Howdy,
I wrote a patch for Crypt::SSLeay 0.17 which includes proxy and basic
client-cert support. I can also supply an adopted version of Josh's net_ssl_test
script which illustrates its usage.
Regards
Tobias
> I was sent a patch for this, but have not had time yet to
> integrate it, if you wou
D]; [EMAIL PROTECTED]
Subject: expired certificate question
This is also sort of a behaviour question. If someone connects to a
web server and that server's certificate has expired, should that
person really be concerned since the information they're sending back
to the server is still probab
> This is also sort of a behaviour question. If someone connects to a
> web server and that server's certificate has expired, should that
> person really be concerned since the information they're sending back
> to the server is still probably encrypted?
Sure, it's still encrypted -- in fact tha
This is also sort of a behaviour question. If someone connects to a
web server and that server's certificate has expired, should that
person really be concerned since the information they're sending back
to the server is still probably encrypted?
In IE you can turn off the two options "check for
Geoff Thorpe <[EMAIL PROTECTED]> writes:
>Modern operating systems generally make memory
>scanning a lot more difficult in a process that has setuid()'d from root
>to something else. Apache's setuid prevents core-dumping.
Ok, forget gcore. Use ptrace. From the FreeBSD ptrace docs:
"This requ
Hi,
On Mon, 22 Nov 1999, Michael Robinson wrote:
> Everyone says that, but I've never seen anyone elucidate on the so-called
> "obvious" reasons.
>
> The key file is protected by root-read-only permissions. Only someone with
> root access can read the file. If someone has root access, they ca
Michael Robinson wrote:
>
> Patrik Carlsson <[EMAIL PROTECTED]> writes:
> >You could remove your key passphrase - but it's not recommended for obvious
> >security reasons!
>
> Everyone says that, but I've never seen anyone elucidate on the so-called
> "obvious" reasons.
>
> The key file is prot
Patrik Carlsson <[EMAIL PROTECTED]> writes:
>You could remove your key passphrase - but it's not recommended for obvious
>security reasons!
Everyone says that, but I've never seen anyone elucidate on the so-called
"obvious" reasons.
The key file is protected by root-read-only permissions. Only
You could remove your key passphrase - but it's not recommended for obvious security
reasons! Use e.g. "openssl rsa -in ". For other suggestions, checkout the
mail list archives.
Patrik
logrus wrote:
> hi
> i've just subscribed to the list after successfuly installing mod_ssl, openssl etc,
hi
i've just subscribed to the list after successfuly installing mod_ssl, openssl etc, &
compiling & running my newly configured apache httpd without fault.
my apologies, if i'm asking a redundant question, or maybe missed something in the
docs.
the only thing is that the daemon requests the
> I need to have the certificates up and running by Jul 1st, and I understand
> that the CAs take about two weeks to deliver (Am I right?)
Thawte (http://www.thawte.com) lets you download a test certificate,
but that's probably not what you want.
> Is it possible to ask for a certificate
On Thu, Jun 17, 1999 at 12:12:26PM -0500, Marco A. Zamora Cunningham wrote:
> I'm setting up an HP-UX system with SSL (primarily for Apache+mod_ssl, but
> I'll also do some PGP-style data signing).
> My problem is: I'm working on a tight deadline and I'm having lots of
> problems compiling/instal
Paul Khavkine wrote:
>
> As far as i know RHat is still using SSLeay.
> If it is it should work fine.
Even if they weren't, a cert is a cert - the only thing that might give
trouble is file formats.
Cheers,
Ben.
--
http://www.apache-ssl.org/ben.html
"My grandfather once told me that there ar
As far as i know RHat is still using SSLeay.
If it is it should work fine.
On Thu, 18 Nov 1999, you wrote:
> Hi all,
>
> I need a second (and third and fourth?) opinion on some information I got
> from Thawte.
>
> I told them I was currently using Apache+mod_ssl, and would be switching
> to R
Hi all,
I need a second (and third and fourth?) opinion on some information I got
from Thawte.
I told them I was currently using Apache+mod_ssl, and would be switching
to Redhat Secure Server in a couple of weeks. I asked the U.S. rep what
would happen if I obtained the cert as generated by O
30 matches
Mail list logo