: openssl-users@openssl.org
Subject: Re: FW: openssl verify conflicts with SSL_connect
On Wed, May 04, 2005, John Hoel wrote:
> After another round of changes to the certificates I created, I ran s_client
> and s_server. Here are the scripts:
>
> openssl s_client -cert c:/ca/clien
On Wed, May 04, 2005, John Hoel wrote:
> After another round of changes to the certificates I created, I ran s_client
> and s_server. Here are the scripts:
>
> openssl s_client -cert c:/ca/client/client.pem -CApath c:/ca/trusted
>
> openssl s_server -cert c:/ca/server/server.pem -CApath c:/ca/t
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Dr. Stephen Henson
Sent: Thursday, April 28, 2005 3:57 PM
To: openssl-users@openssl.org
Subject: Re: FW: openssl verify conflicts with SSL_connect
On Thu, Apr 28, 2005, John Hoel wrote:
> I have been do
On Thu, Apr 28, 2005, John Hoel wrote:
> I have been doing that all along. That's what is so exasperating - following
> insructions doesn't seem to help. (arghh! head banging). That's the 2nd
> function argument. 3rd argument is NULL (not using CAdir).
>
> The file passed to SSL_CTX_use_certifi
PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Dr. Stephen Henson
Sent: Thursday, April 28, 2005 1:08 PM
To: openssl-users@openssl.org
Subject: Re: FW: openssl verify conflicts with SSL_connect
On Thu, Apr 28, 2005, John Hoel wrote:
> To include it in the trusted store, I think I will need to
On Thu, Apr 28, 2005, John Hoel wrote:
> To include it in the trusted store, I think I will need to hash it and the
> 'root.pem' file as well. I haven't been able to find anything describing how
> this is done. Can you refer me to something?
>
You just keep root.pem as it is and pass it in the C
D] Behalf Of Dr. Stephen Henson
Sent: Tuesday, April 26, 2005 10:42 AM
To: openssl-users@openssl.org
Subject: Re: FW: openssl verify conflicts with SSL_connect
On Tue, Apr 26, 2005, John Hoel wrote:
> I've made extensive changes to how I generate certificates. Here is a partial
> lis
EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Dr. Stephen Henson
Sent: Wednesday, April 27, 2005 10:36 AM
To: openssl-users@openssl.org
Subject: Re: FW: openssl verify conflicts with SSL_connect
On Tue, Apr 26, 2005, John Hoel wrote:
> I also created the server certificate based on the same
On Tue, Apr 26, 2005, John Hoel wrote:
> I also created the server certificate based on the same book and chapter. It
> is using the same trusted certificate (root.pem) as the client. This is an
> application that connects to itself, outbound as a client and inbound as a
> server. Makes for com
EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Dr. Stephen Henson
Sent: Tuesday, April 26, 2005 2:00 PM
To: openssl-users@openssl.org
Subject: Re: FW: openssl verify conflicts with SSL_connect
On Tue, Apr 26, 2005, John Hoel wrote:
> I created these certificates based on chapter 5 of "Net
On Tue, Apr 26, 2005, John Hoel wrote:
> I created these certificates based on chapter 5 of "Network Security with
> OpenSSL". The client certificate is signed with the root CA, and that in
> turn is the only item in the trusted store (root.pem). Why would this not
> work? Here is a partial listin
-1110 main
(425)396-4687 direct
[EMAIL PROTECTED]
www.skywiresoftware.com
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Dr. Stephen Henson
Sent: Tuesday, April 26, 2005 10:42 AM
To: openssl-users@openssl.org
Subject: Re: FW: openssl verify conflicts with S
On Tue, Apr 26, 2005, John Hoel wrote:
> I've made extensive changes to how I generate certificates. Here is a partial
> listing of the revised client certificate:
>
> Certificate:
> Data:
> Version: 1 (0x0)
> Serial Number:
> ed:db:89:05:53:74:2b:55
> Sig
I've made extensive changes to how I generate certificates. Here is a partial
listing of the revised client certificate:
Certificate:
Data:
Version: 1 (0x0)
Serial Number:
ed:db:89:05:53:74:2b:55
Signature Algorithm: sha1WithRSAEncryption
Issuer: CN
14 matches
Mail list logo