OK. Thanks for replying.
On Thu, 2010-07-08 at 18:59 +0200, Dr. Stephen Henson wrote:
> The only current example of an external EVP_PKEY_METHOD (in the gost ENGINE)
> implements everything from scratch.
>
> It is perfectly reasonable for another implementation to copy existing methods
> or inter
On Thu, Jul 08, 2010, Jeff Saremi wrote:
> The structure itself is only forward-declared meaning that a programmer
> has no way of getting into the actual evp_pkey_method_st and its fields.
> Now that would be fine if there were a complete set of methods
> EVP_PKEY_meth_* to manipulate the pointer
Carlos,
I was not able to open the .crt files. The tid_x1_ne.cacert is a PKCS 7
chain that you should be able to open with OpenSSL.
I did an ASN.1 parse and have the output below from 4R-CA_1.crt. Maybe
someone on the list can do something with it.
Chris
0:d=0 hl=4 l= 608 cons: SEQUENCE
> Now these are the SAME ciphers as another site I tried that works!
>
> Am I doing something wrong? Is this site just being more strict than
> others about letting me send data to it? What can I do?
>
> The site in question is https://www.multicards.com
>
> If anyone has any idea how to solve