Re: X509 problem

2014-09-24 Thread nicolas . kox
return 0; } - Mail original - De: "nicolas kox" À: openssl-users@openssl.org Envoyé: Mercredi 24 Septembre 2014 14:07:16 Objet: Re: X509 problem my bad... good luck anyway - Mail original - De: "Amir Reda" À: openssl-users@openssl.org Envoyé: Mercredi 24 S

Re: X509 problem

2014-09-24 Thread nicolas . kox
my bad... good luck anyway - Mail original - De: "Amir Reda" À: openssl-users@openssl.org Envoyé: Mercredi 24 Septembre 2014 13:53:30 Objet: Re: X509 problem no sir it is defined i have a pointer from the server as an attribute in the client side if it isn't defined

Re: X509 problem

2014-09-24 Thread Amir Reda
no sir it is defined i have a pointer from the server as an attribute in the client side if it isn't defined it will give a syntax error and i don't have a syntax error thx for reply On Wed, Sep 24, 2014 at 2:44 PM, wrote: > it seems that function "CreateCertificate" is not defined in client.cc

Re: X509 problem

2014-09-24 Thread nicolas . kox
it seems that function "CreateCertificate" is not defined in client.cc Regards - Mail original - De: "Amir Reda" À: openssl-users@openssl.org Envoyé: Mercredi 24 Septembre 2014 13:37:13 Objet: X509 problem dear all i have problem in my code it is a client send a certificate request t

Re: X509 custom extension

2013-04-26 Thread redpath
Thanks and also the OID register. -- View this message in context: http://openssl.6102.n7.nabble.com/X509-custom-extension-tp44930p44933.html Sent from the OpenSSL - User mailing list archive at Nabble.com. __ OpenSSL Project

RE: x509 certificate conforming to RFC 3739

2013-02-28 Thread Steven Madwin
= SET:dateOfBirth_val [ dateOfBirth_val ] id-pda-dateOfBirth.value = GENERALIZEDTIME:"19870427092500Z" -Original Message- From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Walter H. Sent: Sunday, February 17, 2013 9:07 PM To: openssl-users@openssl.org S

Re: x509 certificate conforming to RFC 3739

2013-02-17 Thread Walter H.
On 15.02.2013 07:42, Walter H. wrote: On Fri, February 15, 2013 07:07, Matthew Hall wrote: On Fri, Feb 15, 2013 at 07:03:20AM +0100, Walter H. wrote: Hello, can someone, please tell me, how to generate a certificate that conforms to http://www.ietf.org/rfc/rfc3739.txt (RFC 3739) Thanks, Walte

Re: x509 certificate conforming to RFC 3739

2013-02-14 Thread Walter H.
On Fri, February 15, 2013 07:07, Matthew Hall wrote: > On Fri, Feb 15, 2013 at 07:03:20AM +0100, Walter H. wrote: >> Hello, >> >> can someone, please tell me, how to generate a certificate >> that conforms to http://www.ietf.org/rfc/rfc3739.txt (RFC 3739) >> >> Thanks, >> Walter > > Hi Walter, > >

Re: x509 certificate conforming to RFC 3739

2013-02-14 Thread Matthew Hall
On Fri, Feb 15, 2013 at 07:03:20AM +0100, Walter H. wrote: > Hello, > > can someone, please tell me, how to generate a certificate > that conforms to http://www.ietf.org/rfc/rfc3739.txt (RFC 3739) > > Thanks, > Walter Hi Walter, We could help better if we understood what's not working for you a

RE: X509* and Extract Public Key?

2013-02-12 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Jeffrey Walton > Sent: Monday, 11 February, 2013 23:04 Some minor points: > On Mon, Feb 11, 2013 at 5:15 PM, Dave Thompson wrote: > >> On Mon, Feb 11, 2013 at 12:01:49AM -0500, Jeffrey Walton wrote: > > To "write out" to a file, don't need

Re: X509* and Extract Public Key?

2013-02-11 Thread Jeffrey Walton
On Mon, Feb 11, 2013 at 5:15 PM, Dave Thompson wrote: >> From: owner-openssl-us...@openssl.org On Behalf Of Viktor Dukhovni >> Sent: Monday, 11 February, 2013 00:41 > >> On Mon, Feb 11, 2013 at 12:01:49AM -0500, Jeffrey Walton wrote: >> >> > >> I'm trying to extract a public key (subjectPublicKeyI

RE: X509* and Extract Public Key?

2013-02-11 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Viktor Dukhovni > Sent: Monday, 11 February, 2013 00:41 > On Mon, Feb 11, 2013 at 12:01:49AM -0500, Jeffrey Walton wrote: > > > >> I'm trying to extract a public key (subjectPublicKeyInfo) > > >> form an X509 certificate. > > > > > > from apps

Re: X509* and Extract Public Key?

2013-02-11 Thread Jeffrey Walton
On Mon, Feb 11, 2013 at 12:41 AM, Viktor Dukhovni wrote: > On Mon, Feb 11, 2013 at 12:01:49AM -0500, Jeffrey Walton wrote: > >> >> I'm trying to extract a public key (subjectPublicKeyInfo) form an X509 >> >> certificate. >> > >> > from apps/x509.c in the openssl source: >> > >> > EVP_PKEY

Re: X509* and Extract Public Key?

2013-02-10 Thread Viktor Dukhovni
On Mon, Feb 11, 2013 at 12:01:49AM -0500, Jeffrey Walton wrote: > >> I'm trying to extract a public key (subjectPublicKeyInfo) form an X509 > >> certificate. > > > > from apps/x509.c in the openssl source: > > > > EVP_PKEY *pkey; > > > > pkey=X509_get_pubkey(x); This is not the su

Re: X509* and Extract Public Key?

2013-02-10 Thread Jeffrey Walton
On Sun, Feb 10, 2013 at 11:31 PM, Daniel Black wrote: > On 11/02/13 14:12, Jeffrey Walton wrote: >> Hi All, >> >> I'm trying to extract a public key (subjectPublicKeyInfo) form an X509 >> certificate. >> > > from apps/x509.c in the openssl source: > > x=load_cert(bio_err,infile,informat,NULL,e,"Ce

Re: X509* and Extract Public Key?

2013-02-10 Thread Daniel Black
On 11/02/13 14:12, Jeffrey Walton wrote: > Hi All, > > I'm trying to extract a public key (subjectPublicKeyInfo) form an X509 > certificate. > > Should I look for the subjectPublicKeyInfo in X509_EXTENSION_get_object? > > What is the easiest (or recommended) way? > > Jeff >

Re: X509 V1 intermediate CA vs end-entity

2012-10-21 Thread Kyle Hamilton
You can find out if the V1 cert verifies directly with any of the certificates in the trust store or its own public key. There's pretty much nothing else you can do with it, other than try to link it to a Distinguished Name that may or may not be useful. Also, (EXFLAG_V1|EXFLAG_SS) doesn't tell y

Re: X509 V1 intermediate CA vs end-entity

2012-09-25 Thread sanjaya joshi
Hi steve, Thanks. Got it. That means we can't differentiate between CA and end-entity in case of V1 certificate. We can only find out if the V1 cert is a self-signed certificate or not. Correct ? Regards, Sanjaya On Wed, Sep 26, 2012 at 2:36 AM, Dr. Stephen Henson wrote: > On Tue, Sep 25, 2012

Re: X509 V1 intermediate CA vs end-entity

2012-09-25 Thread Dr. Stephen Henson
On Tue, Sep 25, 2012, sanjaya joshi wrote: > > We can conclude an X509 V1 certificate to be a root ca using > (EXFLAG_V1|EXFLAG_SS). > Similarly, is there a way to know whether an X509 V1 certificate is an > intermediate CA or end-entity certificate ? > You can't: there is nothing in a V1 certi

Re: X509 V1 intermediate CA vs end-entity

2012-09-25 Thread Kyle Hamilton
Can you figure out a way to do it from the v1 fields? keyUsage is an extension requiring v3. -Kyle H On Sep 24, 2012 11:28 PM, "sanjaya joshi" wrote: > Hi, > > We can conclude an X509 V1 certificate to be a root ca using > (EXFLAG_V1|EXFLAG_SS). > Similarly, is there a way to know whether an X5

Re: X509 certificate algorithm

2012-08-16 Thread Dr. Stephen Henson
On Thu, Aug 16, 2012, Kenneth Goldman wrote: > I call these: > > d2i_X509() > X509_print_fp() > > which calls > pkey_set_type() > EVP_PKEY_asn1_find() > and that call fails. > > I've traced the following error down to the rsaOAEP algorithm, which has a > nid of 919. I

Re: X509 Certificate : Need help to retrieve " Extended Key Usage" filed from the certificate

2012-07-27 Thread Dr. Stephen Henson
On Fri, Jul 27, 2012, Puneet Khunteta wrote: > any Update ? > > regards, > Puneet > > On Thu, Jul 26, 2012 at 4:27 PM, Puneet Khunteta > wrote: > > > Hello Stephen, > > > > On using the suggestion provided by you , got the following output snippet > > > > > > It shows extusage->data Empty. > >

Re: X509 Certificate : Need help to retrieve " Extended Key Usage" filed from the certificate

2012-07-27 Thread Puneet Khunteta
any Update ? regards, Puneet On Thu, Jul 26, 2012 at 4:27 PM, Puneet Khunteta wrote: > Hello Stephen, > > On using the suggestion provided by you , got the following output snippet > > > It shows extusage->data Empty. > > Regards, > Puneet > > On Wed, Jul 25, 2012 at 4:01 PM, Dr. Stephen Henson

Re: X509 Certificate : Need help to retrieve " Extended Key Usage" filed from the certificate

2012-07-26 Thread Puneet Khunteta
Hello Stephen, On using the suggestion provided by you , got the following output snippet It shows extusage->data Empty. Regards, Puneet On Wed, Jul 25, 2012 at 4:01 PM, Dr. Stephen Henson wrote: > On Wed, Jul 25, 2012, Puneet Khunteta wrote: > > > Hello, > > > > I am an user of openssl libra

Re: X509 Certificate : Need help to retrieve " Extended Key Usage" filed from the certificate

2012-07-26 Thread Puneet Khunteta
Same Status !! Regards, Puneet On Thu, Jul 26, 2012 at 2:49 PM, Saurabh Pandya wrote: > On 7/26/12, Puneet Khunteta wrote: > > Hello Sukalp, > > > > I have tried to use the code snippet provided by use . I am able to > create > > the ASN_object and get the data also.but the data is not in readab

Re: X509 Certificate : Need help to retrieve " Extended Key Usage" filed from the certificate

2012-07-26 Thread Saurabh Pandya
On 7/26/12, Puneet Khunteta wrote: > Hello Sukalp, > > I have tried to use the code snippet provided by use . I am able to create > the ASN_object and get the data also.but the data is not in readable form. > > I use X509 instead of X509V3. > > Here is the code that i have used : > > *Ret = X509_g

Re: X509 Certificate : Need help to retrieve " Extended Key Usage" filed from the certificate

2012-07-26 Thread Puneet Khunteta
Hello Sukalp, I have tried to use the code snippet provided by use . I am able to create the ASN_object and get the data also.but the data is not in readable form. I use X509 instead of X509V3. Here is the code that i have used : *Ret = X509_get_ext_by_NID(cert, field_NID, 0); if ((Ret

Re: X509 Certificate : Need help to retrieve " Extended Key Usage" filed from the certificate

2012-07-25 Thread Dr. Stephen Henson
On Wed, Jul 25, 2012, Puneet Khunteta wrote: > Hello, > > I am an user of openssl library. > I am seeking for a method to get the "Extended Key Usage" field from the > X509 certificate . > I will be grateful if you can provide me a sample code in c. > You can retrieve a structure representing a

Re: X509 Certificate : Need help to retrieve " Extended Key Usage" filed from the certificate

2012-07-25 Thread Sukalp Bhople
Hi, You will have to go through Openssl source code. Have a look at following files: 1. x509_v3.c (around line 74), You will find the following method: int X509v3_get_ext_by_NID(const STACK_OF(X509_EXTENSION) *x, int nid, int lastpos) { ASN1_OBJECT *obj; obj=OBJ_nid2obj(nid); if (obj == NU

Re: X509 - extract remote peer certificate chain to a file

2012-05-07 Thread Josh
You can use PEM_write_bio_X509 or PEM_write_X509 to save X509 into a FILE. You can use PEM_read to read this PEM file when you need it. Thanks! A couple of questions: what is the difference between PEM_write_bio_X509, PEM_write_X509 and PEM_AUX_write_X509 (the latter is what I intended to us

Re: X509 - extract remote peer certificate chain to a file

2012-05-06 Thread Erwin Himawan
You can use PEM_write_bio_X509 or PEM_write_X509 to save X509 into a FILE. You can use PEM_read to read this PEM file when you need it. On Sun, May 6, 2012 at 10:36 PM, Josh wrote: I have a very simple query: as a result of SSL/TLS negotiation I know I > could retrieve a pointer to the remote

RE: x509 -nameopt show_type crash

2012-03-06 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Curt Sampson > Sent: Tuesday, 06 March, 2012 00:38 > If I run > > openssl x509 -nameopt show_type -noout -text -in user-a1.crt > > against the certificate below, the openssl command line > program appears > to crash in the middle of prin

Re: X509 verify

2011-07-28 Thread Andrea Saracino
Also check for error for the status of these two bio write function. >> >> hopefully it helps >> >> *From:* Andrea Saracino >> *Sent:* Wednesday, July 27, 2011 6:05 PM >> *To:* openssl-users@openssl.org >> *Subject:* Re: X509 verify >> >> Hi E

Re: X509 verify

2011-07-27 Thread Erwin Himawan
us of these two bio write function. > > hopefully it helps > > *From:* Andrea Saracino > *Sent:* Wednesday, July 27, 2011 6:05 PM > *To:* openssl-users@openssl.org > *Subject:* Re: X509 verify > > Hi Erwin, thanks for your fast answer. > I dumped both the certificates in

Re: X509 verify

2011-07-27 Thread Erwin Himawan
, 2011 6:05 PM To: openssl-users@openssl.org Subject: Re: X509 verify Hi Erwin, thanks for your fast answer. I dumped both the certificates in 2 PEM files, then I used the X509_print_fp() to obtain the readable version of both of them. The two resulting files are identical. Perhaps there is

Re: X509 verify

2011-07-27 Thread Andrea Saracino
Hi Erwin, thanks for your fast answer. I dumped both the certificates in 2 PEM files, then I used the X509_print_fp() to obtain the readable version of both of them. The two resulting files are identical. Perhaps there is something wrong in the invocation of the i2d/d2i functions. I'm posting an ex

Re: X509 verify

2011-07-27 Thread Erwin Himawan
The way I would verify this is by writting the original X509 object into PEM file and dumping the X509 object resulted from d2i_x509() into another PEM file and compares both files using the openssl ; either using asnparse or x509 command. On Wed, Jul 27, 2011 at 9:46 AM, Andrea Saracino wrote:

Re: X509 Verify callback

2010-05-11 Thread David Woodhouse
On Tue, 2010-05-11 at 09:58 -0400, Chris Bare wrote: > That's almost perfect, but doesn't putting it inside the X509_STORE like this > tell the rest of the code it's trusted? If I'm downloading it using AIA I > can't trust it and still need to chain up to a trusted root. Hm, true. But surely there

Re: X509 Verify callback

2010-05-11 Thread Chris Bare
> On Mon, 2010-05-10 at 14:43 -0400, Chris Bare wrote: > > Is there a way get have X509_verify_cert retry it's path building after it > > gets an X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT? > > My idea is to implement a verify callback that uses the AIA information to > > download the issuer cert and add

Re: X509 Verify callback

2010-05-11 Thread David Woodhouse
On Mon, 2010-05-10 at 14:43 -0400, Chris Bare wrote: > Is there a way get have X509_verify_cert retry it's path building after it > gets an X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT? > My idea is to implement a verify callback that uses the AIA information to > download the issuer cert and add it to the

Re: X509 Verify callback

2010-05-10 Thread Chris Bare
> On 05/10/2010 08:43 PM, Chris Bare wrote: > > Is there a way get have X509_verify_cert retry it's path building after it > > gets an X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT? > > My idea is to implement a verify callback that uses the AIA information to > > download the issuer cert and add it to the

Re: X509 Verify callback

2010-05-10 Thread Peter Sylvester
On 05/10/2010 08:43 PM, Chris Bare wrote: Is there a way get have X509_verify_cert retry it's path building after it gets an X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT? My idea is to implement a verify callback that uses the AIA information to download the issuer cert and add it to the stack of untrust

Re: x509 vs ca

2009-12-03 Thread Jan Danielsson
Dr. Stephen Henson wrote: [---] > I'd speculate that "x509" is automated whereas the "ca" utility > has support for user intervention. You can do almost everything with "x509" > that you can with "ca". The most notable difference is that you can only > generate CRLs using the "ca" utility. Yes,

Re: x509 vs ca

2009-12-02 Thread Dr. Stephen Henson
On Wed, Dec 02, 2009, Jan Danielsson wrote: > Hello, > >I've been trying to wrap my head around certificate signing, and how > it differs when using "x509" and "ca". Please correct me if I'm wrong: > Well they've been about since SSLeay so I can't comment on the precise motivation. I'd spe

Re: [openssl-users] Re: X509 V1 version info

2008-09-11 Thread Madhusudhan reddy
Hi David, Thanks for the reply. I will try to explain my best the main problem i am facing. I ported OpenSSL 0.9.8g version on Symbian, and using OpenSSL to verify certificates. Following is the scenario to verify root certificates. 1. Load root certificate fro

RE: [openssl-users] Re: X509 V1 version info

2008-09-10 Thread David Schwartz
> Hello Experties there, could you pls help me? What's the question exactly? > On Thu, Sep 4, 2008 at 3:45 PM, Kyle Hamilton <[EMAIL PROTECTED]> wrote: >>Honestly, I'm not sure. DER says that there is One True Encoding for >>any given certificate, and I think (but am not sure) that part of it

Re: [openssl-users] Re: X509 V1 version info

2008-09-10 Thread Madhusudhan reddy
Hello Experties there, could you pls help me? On Thu, Sep 4, 2008 at 3:45 PM, Kyle Hamilton <[EMAIL PROTECTED]> wrote: > Honestly, I'm not sure. DER says that there is One True Encoding for > any given certificate, and I think (but am not sure) that part of it > is that "optional" parameters are

Re: [openssl-users] Re: X509 V1 version info

2008-09-04 Thread Kyle Hamilton
Honestly, I'm not sure. DER says that there is One True Encoding for any given certificate, and I think (but am not sure) that part of it is that "optional" parameters are not an option if the intended values match the defaults. I would guess that one of these is actually in violation of the rule

Re: [openssl-users] Re: X509 V1 version info

2008-09-04 Thread Madhusudhan reddy
Hello someone there, i stuck at the problem from quite some time. Could you guys help me in this? A small help in this regard will greately appreciated. Thank you very much. -Madhu On 9/1/08, Madhusudhan reddy <[EMAIL PROTECTED]> wrote: > > Hi, > > Thanks for reply. > > Yes, it

Re: [openssl-users] Re: X509 V1 version info

2008-09-01 Thread Madhusudhan reddy
Hi, Thanks for reply. Yes, it is verign certificate. Even though version info NULL (X509->cert_info->version == NULL), the certifiate verified as valid, the hash creation is equal to the hash in the certificate. I observed, for some X509 V1 certificate the version field is NULL, a

Re: [openssl-users] Re: X509 V1 version info

2008-09-01 Thread Erwann ABALEA
Hi, Hodie Kal. Sep. MMVIII est, Madhusudhan reddy scripsit: >Thanks for the reply. What i mean here is while loading X509 >V1 certificate using the API "PEM_read_bio_X509_AUX(), the verisn filed >itself is null, not the value. Pls check the attached .jpg for the screen >

Re: X509 V1 version info

2008-08-28 Thread Frans de Boer
The version field is offset by one. So, 0=v1, 1=v2, 2=v3 Frans. On Thu, 2008-08-28 at 12:21 +0530, Madhusudhan reddy wrote: > Hi All, > > I am newbie to OpenSSL. I am facing problem verifying root > certificate version X509V1. While debugging found the signature > verification is not

Re: x509 bug? unable to load certificate

2008-07-10 Thread Thomas J. Hruska
Frank J. Iannarilli wrote: Hi, I tried using both the Win32 v0.9.8g and v0.9.8h (along with Shining Light's Visual C++ 2008 Redistributable install) binaries, to no avail. Here's the problem: openssl x509 -inform DER -in smime.p7s -text unable to load certificate 1036:error:0D0680A8:asn

RE: X509 certificates through API

2008-05-20 Thread [EMAIL PROTECTED]
An easy way is to build the openssl binary as a lib but rename main. Then call it with the argv and argc you would send from the command line. -Original Message- From: ext Richard Koenning Sent: 05/20/2008 1:02:54 PM To: openssl-users@openssl.org Subject: Re: X509 certificates through

Re: X509 certificates through API

2008-05-20 Thread Dr. Stephen Henson
On Mon, May 19, 2008, Kenneth Goldman wrote: > > Is there sample code anywhere for how to construct X509 certificates > programmatically, through the API, not the command line? > > The documentation includes the serialization API's, but? > little else. > > I assume, since it can be done from th

Re: X509 certificates through API

2008-05-20 Thread Patrick Patterson
On May 19, 2008 02:09:54 pm Kenneth Goldman wrote: > Is there sample code anywhere for how to construct X509 certificates > programmatically, through the API, not the command line? > > The documentation includes the serialization API's, but? > little else. > > I assume, since it can be done from th

Re: X509 certificates through API

2008-05-20 Thread Richard Koenning
Kenneth Goldman wrote: Is there sample code anywhere for how to construct X509 certificates programmatically, through the API, not the command line? The documentation includes the serialization API's, but? little else. I assume, since it can be done from the command line, that the code exists

Re: X509 common name

2008-04-07 Thread Victor Duchovni
On Tue, Apr 08, 2008 at 12:22:34AM +0200, Dr. Stephen Henson wrote: > Couple of minor points... > > On Mon, Apr 07, 2008, Victor Duchovni wrote: > > > > To parse subjectAlternativeName entries: > > > > X509 *cert; > > STACK_OF(GENERAL_NAME) * gens; > > const GENERAL_NAME *gn; > >

Re: X509 common name

2008-04-07 Thread Dr. Stephen Henson
Couple of minor points... On Mon, Apr 07, 2008, Victor Duchovni wrote: > > To parse subjectAlternativeName entries: > > X509 *cert; > STACK_OF(GENERAL_NAME) * gens; > const GENERAL_NAME *gn; > int num; > int len; > char *dnsname; > > gens = X509_get_ext_d2i(cert, NID

Re: X509 common name

2008-04-07 Thread Victor Duchovni
On Sun, Apr 06, 2008 at 01:24:28AM +0200, Till Elsner wrote: > is there any simple way to get the common name out of an certificate > loaded to an X509 object via PEM_read_X509? It is easy to get *a* common name, usually there is only one. More interesting questions arise should the certificate

RE: X509 Certificate

2007-10-13 Thread David Schwartz
> Hi all. Ok I need to set up a cipher and certificate. But I've a little > question: How to make a X509 certificate? What is the right way to build > a X509 certificate in C? > For example: > > X509 *newx509 = NULL; > newx509 = X509_new(); > assert(newx509 != NULL); > > and then? How to set attri

Re: X509 Request - Do I have to sign it?

2007-06-06 Thread Dr. Stephen Henson
On Wed, Jun 06, 2007, Chaz. wrote: > Stephen, > > Once again thanks so much. I had thought subjectAltName would allow any > kind of alternate name but have found out how wrong I can be. I noticed > in the example use of DNS: I have noticed in the spec there is something > called 'DirName' but I

Re: X509 Request - Do I have to sign it?

2007-06-06 Thread Chaz.
Stephen, Once again thanks so much. I had thought subjectAltName would allow any kind of alternate name but have found out how wrong I can be. I noticed in the example use of DNS: I have noticed in the spec there is something called 'DirName' but I tried 'DirName:mystuff' and it didn't get stored

Re: X509 Request - Do I have to sign it?

2007-06-06 Thread Dr. Stephen Henson
On Wed, Jun 06, 2007, Chaz. wrote: > I have a need to create X509 Requests that will be authenticated by an > external CA. In creating the request do I need to sign it? > You need to use the private key corresponding to the public key in the request. > I also have seen something strange that I

Re: x509 -hash algorithm

2006-10-10 Thread Marek Marcola
Hello, > what is the hash algorithm used in the following to output the 8-digit > string to be used as .0, .1, etc.? > > % openssl x509 -noout -hash -in inter.cert.pem > a0199d1b This is reversed first four bytes of MD5 message digest of cert subject in DER format. For example:

Re: x509 -modulus output to a file

2006-05-12 Thread Marek Marcola
Hello, > > > openssl x509 -modulus -noout -in mycert.crt -out mymod.txt > > to output the modulus to the specified "out" file just like all other > x509 commands with -out specified. It does not. Anybody know how to > get the modulus sent to a file? > > openssl x509 -modulus -noout -in myc

Re: X509 cert time - i got it

2006-03-16 Thread michael Dorrian
Here is another thread that converts the time to a string. It may be helpful in the future http://www.securitybuzz.org/buzz/emails/id/276651/vipin rathor <[EMAIL PROTECTED]> wrote:hi DS and all,    i was just searching the mail archive and fortunately i got the conversation between "Tan Eng T

RE: X509 cert time

2006-03-16 Thread michael Dorrian
Stephan, This function "X509_get_notBefore(cert));" returns a ASN1_TIME pointer so u cannot print out the results using %d which is for integers or maybe it prints out something but not correct. Now just call like this: ASN1_TIME *cert_time; char *pstring; cert_time = X509_get_notBefore(cert));

RE: X509 cert time

2006-03-16 Thread Stefan Vatev
> hi DS, >here is the code snippet i'm using: > > X509 *cert; > FILE fp; > fp=fopen("cacert.der","r"); > /* error check*/ > cert=d2i_X509_fp(fp,NULL); > /* error check*/ > printf("Valid From : %d",X509_get_notBefore(cert)); > /*gives 13 and when printed using %s, it gives >

RE: X509 cert time

2006-03-16 Thread vipin rathor
hi DS, here is the code snippet i'm using:   X509 *cert; FILE fp; fp=fopen("cacert.der","r"); /* error check*/ cert=d2i_X509_fp(fp,NULL); /* error check*/ printf("Valid From : %d",X509_get_notBefore(cert));  /*gives 13 and when printed using %s, it gives segmentation fault*/     

RE: X509 cert time

2006-03-16 Thread David Schwartz
> hi all, >now i'm able to get the certificate timing info. by using the call X509_get_notAfter() and X509 > _get_notBefore()but they are returning the values in integer type( in my case, both return 13 and 13) > so anybody can help me out to get the timing info. in proper date format.

Re: X509 info

2006-03-14 Thread Dr. Stephen Henson
On Tue, Mar 14, 2006, michael Dorrian wrote: > Here is a function to do what you want that i just wrote today. At least i > hope its what you want. Good luck!. > void ShowCerts(SSL* ssl) > { X509 *cert; >char buf[100]; >/* get the server's certificate */ > cert = SSL_get_peer_certific

Re: X509 info

2006-03-14 Thread michael Dorrian
Here is a function to do what you want that i just wrote today. At least i hope its what you want. Good luck!. void ShowCerts(SSL* ssl){   X509 *cert;  char buf[100];  /* get the server's certificate */ cert = SSL_get_peer_certificate(ssl); if ( cert != NULL )    {    /* issuer */   X509_NAM

Re: X509 info

2006-03-13 Thread Bernhard Froehlich
vipin rathor wrote: hi all, I want to develop a small utility in C to show all information about the X509 certificate file in a structured comprehensive(as displayed by browsers like IE). i'm working on SLES 9. so please help me out one more thing, i know the routines like X509_get

Re: X509 cetificate! HELP!D!=!-!)

2006-03-09 Thread Doug Frippon
Thx Brian that's exactly what I was trying to figure out. For the part on where cert goes and how to tell apps to use it it's ok but almost from the begining, I though that my cert have been made incorrectly so that's why I was postinghere. From that point I should be able to make it work. thanks t

Re: X509 cetificate! HELP!D!=!-!)

2006-03-09 Thread Brian Candler
On Thu, Mar 09, 2006 at 10:46:51AM -0500, Doug Frippon wrote: > I'm not sure that I should post it on a OpenBSD mailling list because > my ISAKMPD is working well with pre-shared key. The only bog come from > the certificate. I know that I should create a CA certificate, a > certificate for the OBS

Re: X509 cetificate! HELP!D!=!-!)

2006-03-09 Thread Doug Frippon
I'm not sure that I should post it on a OpenBSD mailling list because my ISAKMPD is working well with pre-shared key. The only bog come from the certificate. I know that I should create a CA certificate, a certificate for the OBSD and one for the remote user. but what should I export to OpenBSD and

Re: X509 cetificate! HELP!D!=!-!)

2006-03-09 Thread Brian Candler
On Thu, Mar 09, 2006 at 09:13:05AM -0500, Doug Frippon wrote: > I most admit that I haven`t tried that search exactly but I ve got > this error with ISAKMPD adn try with that instead of openssl. > Thx > But I'd like to know what should I do with all the certs that I have > to create. Which should g

Re: X509 cetificate! HELP!D!=!-!)

2006-03-09 Thread Doug Frippon
I most admit that I haven`t tried that search exactly but I ve got this error with ISAKMPD adn try with that instead of openssl. Thx But I'd like to know what should I do with all the certs that I have to create. Which should go on the host pc (my OBSD where the CA is and etc...) and wich on the us

Re: X509 cetificate! HELP!D!=!-!)

2006-03-08 Thread Brian Candler
On Wed, Mar 08, 2006 at 03:10:23PM -0500, Doug Frippon wrote: > Hi, I am trying to generate certificate that i,ll be using for a ipsec > segment between a OBSD 3.8 and a Windows worstation. I'm using ISAKMPD > for this on the OBSD side and the security filter on Windows. If I use > a pre-shared key

Re: X509 extensions

2006-02-08 Thread Girish Venkatachalam
There is a utility called "certpatch" developed by OpenBSD folks for including the SubjAltName extension. I have modified it a little bit to suit my need. This utility modifies the certificate in place and regenerates the hash. Perhaps you can modify it a little to suit your need. If all you nee

Re: X509 extensions

2006-02-08 Thread Kyle Hamilton
...you can't, without re-signing the certificate. (changing the certificate data invalidates the signed hash.) However, if you want to, you can use openssl x509 -x509toreq -in currentcert.pem -out currentcert.req . Then, create a new configuration template file with the information you want to r

Re: x509 CRL v2

2006-01-18 Thread Daniel García Franco
Dr. Stephen Henson wrote: On Tue, Jan 17, 2006, Daniel Garca Franco wrote: I would like to use other CRL Revoke Reason as "superseded", "unspecified", etc... with the CRL Entry Extension InvalidityDate, not that the use of CRL Entry Extension InvelidityDate force to set the CRL Revoke R

Re: x509 CRL v2

2006-01-17 Thread Dr. Stephen Henson
On Tue, Jan 17, 2006, Daniel Garca Franco wrote: > > I would like to use other CRL Revoke Reason as "superseded", > "unspecified", etc... with the > CRL Entry Extension InvalidityDate, not that the use of CRL Entry > Extension InvelidityDate > force to set the CRL Revoke Reason to keyCompro

Re: x509 CRL v2

2006-01-17 Thread Daniel García Franco
Dr. Stephen Henson wrote: On Mon, Jan 16, 2006, Daniel Garca Franco wrote: Hello! I use the v2 of CRL, and i have to revoke the certificates with 2 extension, CRL Revoke Reason and InvalidityDate, i Know how to pass the first extension to openssl when i revoke a certificate, but i don´t kn

Re: x509 CRL v2

2006-01-16 Thread Dr. Stephen Henson
On Mon, Jan 16, 2006, Daniel Garca Franco wrote: > Hello! > > I use the v2 of CRL, and i have to revoke the certificates > with 2 extension, CRL Revoke Reason and InvalidityDate, i Know how to > pass the first extension to openssl when i revoke a certificate, but > i don´t know how to pass the s

Re: X509 certificate request in PKCS 12 format ?

2006-01-09 Thread Dr. Stephen Henson
On Mon, Jan 09, 2006, Rajeshwar Singh Jenwar wrote: > Can we have X509 certificate request in PKCS 12 format ? There is no standard for including certificate requests in PKCS#12 files. Steve. -- Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage OpenSSL project core developer and fre

Re: X509 digest different after write and read to-from PEM

2005-10-25 Thread M G
Dr. Henson, Looks like the check on the >0 and not just != -1 did the trick! Thank you for helping me! Cheers! --- "Dr. Stephen Henson" <[EMAIL PROTECTED]> wrote: > On Tue, Oct 25, 2005, M G wrote: > > > Hi Dr. Henson, > > > > You were wondering what code I used to produce the > > digest: I

Re: X509 digest different after write and read to-from PEM

2005-10-25 Thread Dr. Stephen Henson
On Tue, Oct 25, 2005, M G wrote: > Hi Dr. Henson, > > You were wondering what code I used to produce the > digest: I used my X509 certificate to get the > fingerprint with GetSHAFingerprint() - then I wrote > the X509 to PEM, then I read it back and called > GetSHAFingerprint() again and receive

Re: X509 digest different after write and read to-from PEM

2005-10-25 Thread M G
Hi Dr. Henson, You were wondering what code I used to produce the digest: I used my X509 certificate to get the fingerprint with GetSHAFingerprint() - then I wrote the X509 to PEM, then I read it back and called GetSHAFingerprint() again and received a different fingerprint. Is this supposed to

Re: X509 digest different after write and read to-from PEM

2005-10-24 Thread M G
This is the code I used: (after the generate function code shown earlier in this thread - I have an m_pX509) - this is what I do with it:    m_strPEMText = X509ToPEM(m_pX509); m_strFingerprint = GetSHAFingerprint(m_pX509); ::MessageBox(NULL, m_strFingerprint, "ORIGINAL FINGERPRINT", MB_OK);   // cr

Re: X509 digest different after write and read to-from PEM

2005-10-23 Thread Rich Salz
If there is a difference as small as one bit then the digests should be different. /r$ -- Rich Salz Chief Security Architect DataPower Technology http://www.datapower.com This address will be going away; please use [EMAIL PROTECTED] ___

Re: X509 digest different after write and read to-from PEM

2005-10-23 Thread Dr. Stephen Henson
On Sun, Oct 23, 2005, M G wrote: > Hi Dr. Henson, > > Thanks in advance for taking a look: Here is my code that creates the > certificate (I removed the checks on return values - they were fine) > > m_pX509 = X509_new(); > > X509_set_version(m_pX509, 2); > X509_gmtime_adj(X509_get_notBefor

Re: X509 digest different after write and read to-from PEM

2005-10-23 Thread M G
Hi Dr. Henson,   Thanks in advance for taking a look:  Here is my code that creates the certificate (I removed the checks on return values - they were fine)   m_pX509 = X509_new();   X509_set_version(m_pX509, 2); X509_gmtime_adj(X509_get_notBefore(m_pX509),0); X509_gmtime_adj(X509_get_notAfter(m_pX

Re: X509 digest different after write and read to-from PEM

2005-10-22 Thread Dr. Stephen Henson
On Sat, Oct 22, 2005, M G wrote: > Hi list, > > I noticed that the DER string representation was very very similar (longer by > one byte) and only different by very few bytes... i.e., they are almost > exactly the same thing I am trying to get to the cause of why the digest > differs bet

Re: X509

2005-10-22 Thread M G
Could this software bug be something I forgot to add to my certificate when creating it?  i.e., I newly create the X509 and use PEM_write_bio_X509 and PEM_read_bio_x509...  Checking the digest on these 2 X509s is *supposed* to have the same fingerprint?  I am really not doing much here - just writi

Re: X509

2005-10-22 Thread Rich Salz
> Does anyone know why an X509 digest would be different after the X509 is > written out and read back into another X509 from PEM? Software bug. No other explanation. /r$ -- Rich Salz Chief Security Architect DataPower Technology http://www.datapower.com This add

RE: X509 Cert dates

2005-05-25 Thread Pj
Thanks guys, you rock! -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Tan Eng Ten Sent: Thursday, 26 May 2005 12:13 PM To: openssl-users@openssl.org Subject: Re: X509 Cert dates Hi Pj, U could use memory BIO instead - BIO_new(BIO_s_mem()). Data written

Re: X509 Cert dates

2005-05-25 Thread Tan Eng Ten
f Of Tan Eng Ten Sent: Thursday, 26 May 2005 10:30 AM To: openssl-users@openssl.org Subject: Re: X509 Cert dates Hi, U could try: BIO *bio = BIO_new_fp(stdout, BIO_NOCLOSE); ASN1_TIME_print(bio, X509_get_notBefore(cert)); BIO_free(bio); Tell me if it works. Pj wrote:

RE: X509 Cert dates

2005-05-25 Thread Pj
ose(fp); } _unlink(tmpFile); free(tmpFile); // -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Tan Eng Ten Sent: Thursday, 26 May 2005 10:30 AM To: openssl-users@openssl.org Subject: Re: X509 Cert dates Hi, U could try: BIO

  1   2   >