Hi!
I'm sorry if I'm a pain in the ... about this spam business, but is it possible that
it's the mailing list server that is distributing the spam?
In the most recent spam, the senders header contains this line:
> Return-Path: [EMAIL PROTECTED]
Could this be used to get a mail on the list wit
Lyngmo Ted wrote:
Hi!
I'm sorry if I'm a pain in the ... about this spam business, but is it possible that it's the mailing list server that is distributing the spam?
In the most recent spam, the senders header contains this line:
Return-Path: [EMAIL PROTECTED]
Could this be used to get
<>
Hi everybody,
I need to extrect the list of CA sent from server to
client in
certificate_request message. I have a buffer with all
ssl_handshake
message (bytes) and I can extarct from it each single
field that
I need.
So I have extracted the bytes that rapresent DN of a
CA, but
I can't understand n
On Mon, Oct 06, 2003, chiba4mail wrote:
> Hi everybody,
> I need to extrect the list of CA sent from server to
> client in
> certificate_request message. I have a buffer with all
> ssl_handshake
> message (bytes) and I can extarct from it each single
> field that
> I need.
> So I have extracted th
Hello,
a Newbie Question:
I want to generate Certificates for use with
Smartcards for Microsoft Smartcard Login.
For testing I setup a Microsoft Windows 2000 CA and
generated a Certificate. I stored the certificate on a
smartcard and it worked.
The certificates I generate with openssl do not work.
On Mon, Oct 06, 2003, Martin Plenk wrote:
> Hello,
>
> a Newbie Question:
> I want to generate Certificates for use with
> Smartcards for Microsoft Smartcard Login.
> For testing I setup a Microsoft Windows 2000 CA and
> generated a Certificate. I stored the certificate on a
> smartcard and it wo
chiba4mail <[EMAIL PROTECTED]> writes:
> So I have extracted the bytes that rapresent DN of a
> CA, but
> I can't understand nothing of it, probably because it
> is in ASN1
> format.
The certificate is probably a DER encoded ASN.1 structure.
> Which function can I use to correctly extract the DN
On Mon, Oct 06, 2003, Jostein Tveit wrote:
> chiba4mail <[EMAIL PROTECTED]> writes:
>
> > So I have extracted the bytes that rapresent DN of a
> > CA, but
> > I can't understand nothing of it, probably because it
> > is in ASN1
> > format.
>
> The certificate is probably a DER encoded ASN.1 stru
Hi,
I've tried to find a way to extract the server certificate (loaded using
the SSL_CTX_use_certificate_chain_file/SSL_CTX_use_PrivateKey_file
calls) common name field but with little luck...
...any ideas?
Thanks in advance!
/Stefan
--
If you make people think they're thinking, they'll love
"Dr. Stephen Henson" <[EMAIL PROTECTED]> writes:
> If its the CA list in a certificate request then it is a load of Name
> structures i.e. just the DNs and not the whole certificate.
Ahhh... I misunderstood. But the DNs are still DER encoded, right?
--
Jostein Tveit ([EMAIL PROTECTED])
On Mon, Oct 06, 2003, Martin Plenk wrote:
> Hello,
>
> a Newbie Question:
> I want to generate Certificates for use with
> Smartcards for Microsoft Smartcard Login.
> For testing I setup a Microsoft Windows 2000 CA and
> generated a Certificate. I stored the certificate on a
> smartcard and it wo
12 matches
Mail list logo