Re: TLSv1.2 Distinguished Names Length 0 / how to set it

2022-01-20 Thread Olivier Germain via openssl-users
:21:27PM +0100, Olivier Germain via > openssl-users wrote: > > > We have a requirement to implement the Distinguished Name in the > response > > received by the client. Hopefully I am ok. > > More accurately, you're being asked to send a suitable non-empty list o

自动回复: Re: TLSv1.2 Distinguished Names Length 0 / how to set it

2022-01-19 Thread 562430030 via openssl-users
您好,您的邮件我已收到,我会尽快阅读,谢谢!

Re: TLSv1.2 Distinguished Names Length 0 / how to set it

2022-01-19 Thread Viktor Dukhovni
On Wed, Jan 19, 2022 at 05:21:27PM +0100, Olivier Germain via openssl-users wrote: > We have a requirement to implement the Distinguished Name in the response > received by the client. Hopefully I am ok. More accurately, you're being asked to send a suitable non-empty list of &qu

TLSv1.2 Distinguished Names Length 0 / how to set it

2022-01-19 Thread Olivier Germain via openssl-users
Good afternoon, I am new in Openssl, SSL. So please excuse my poor knowledge. We are using Openssl 1.0.2j as a 3rdparty in our software to establish SSL connection. We can be a server and/or a client. We have a requirement to implement the Distinguished Name in the response received by the clie

Re: [openssl-users] Strictness of comparing distinguished names

2015-10-02 Thread Jakob Bohm
On 02/10/2015 16:20, Jeffrey Walton wrote: So I am wondering what the officially correct behavior is when verifying such a case. Should the SignerInfo.issuerAndSerialNumber.issuer be treated as matching or as not matching a certificate in which an otherwise identical string is tagged differently

Re: [openssl-users] Strictness of comparing distinguished names

2015-10-02 Thread Jeffrey Walton
> So I am wondering what the officially correct behavior is > when verifying such a case. Should the > SignerInfo.issuerAndSerialNumber.issuer be treated as > matching or as not matching a certificate in which an > otherwise identical string is tagged differently but > represents the same textual

[openssl-users] Strictness of comparing distinguished names

2015-10-02 Thread Jakob Bohm
Dear list, I have encountered a behavior difference between the CMS routines in OpenSSL and the equivalent functionality in another CMS implementation, and I wonder which is the correct behavior. I was examining a CMS signature made by someone else and found that some implementations accepted it

Re: [openssl-users] Is ordering of distinguished names for subject and issuer in OpenSSl 0.9.8 certificates important?

2013-02-08 Thread Peter Sylvester
Ording is important. unfortunately the default order shown in the textual form is not the same as for ldap tools. using openssl asn1parse shows the encoding, country code should come first. __ OpenSSL Project

Re: [openssl-users] Is ordering of distinguished names for subject and issuer in OpenSSl 0.9.8 certificates important?

2013-02-08 Thread Erwann Abalea
Since you need authoritative elements, start by downloading and reading authoritative documents (all are freely available from ITU-T website). X.509, section 7: - [...] The issuer and subject fields of each certificate are used, in part, to identify a valid path. For each pair of adjacent c

RE: Is ordering of distinguished names for subject and issuer in OpenSSl 0.9.8 certificates important?

2013-02-08 Thread Salz, Rich
I think either you mis-read the web page, or the author is confused. Looking at RFC 2253, it quotes X.501 which says: DistinguishedName ::= RDNSequence RDNSequence ::= SEQUENCE OF RelativeDistinguishedName RelativeDistinguishedName ::= SET SIZE (1..MAX) OF AttributeTypeAndValue AttributeTypeAndVal

Is ordering of distinguished names for subject and issuer in OpenSSl 0.9.8 certificates important?

2013-02-08 Thread Simner, John
Dear All, I am working on an embedded product which has the OpenSSL 0.9.8w library and acts as a client. It is communicating with another product which has the OpenSSL 0.9.8e library and acts as a server. A customer has supplied the client certificate for the server and the associated root CA t

Distinguished names

2004-01-19 Thread Raymund Tump
Hi all, I trying to decode the issuer and subject of X509 certs into distinguished names. Mainly I'm doing this: e = X509_NAME_get_entry(x->cert_info->issuer, i); int nid = OBJ_obj2nid(e->object); switch(nid) I think there must be a better