Thank you Steve. It works fine.
Have a nice day.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Dr. Stephen Henson
Sent: Tuesday, November 14, 2006 6:44 PM
To: openssl-users@openssl.org
Subject: Re: Any API available to get the CRL next update time in
Hi list,
I have few questions regarding pkcs#12 implementation in openssl.
If I have a pkcs#12 keystore file that keeps more than one certificate
in it,
1. How to identify/retrieve a certificate given a private key?
2. How to identify/retrieve a certificate uniquely (is it the private
key or
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Clem Taylor schrieb:
> Hi,
Hello Clem,
> It seems silly that the browser is putting so much trust
> into DNS or an IP address. I'm hoping someone knows of a better
> solution to this problem.
No the other way around:
It assumes the user want to acces
Hi,
I've implemented (in C++) a simple form of shamir secret sharing for the
particular case (3,5). One function receives a BIGNUM A0 an generates the 5
secrets. Another function, receives 3 secrets and generates the recover BIGNUM
A0. It's working fine.
The problem is
I'm working on an application that recieves an x509 certificate along
with a request. I want to confirm that the certificate has not been
altered (perhaps to change the "not_after" time).
Does the following command give this confirmation:
$ openssl verify -CAfile trusted.cert test.cert
My appli
This isn't an OpenSSL specific question. Please excuse it if you dont
find the question interesting and OT.
I'm looking for a mathematical algorithm which takes a small block of
data 128bits to 4Kb and performs an encryption transform. But I want to
encryption process to *require* vast amo
Rafael Cividanes wrote:
Hi,
I've implemented (in C++) a simple form of shamir secret sharing for
the particular case (3,5). One function receives a BIGNUM A0 an
generates the 5 secrets. Another function, receives 3 secrets and
generates the recover BIGNUM A0. It's working fine.
Hello,
> I'm working on an application that recieves an x509 certificate along
> with a request. I want to confirm that the certificate has not been
> altered (perhaps to change the "not_after" time).
>
> Does the following command give this confirmation:
>
> $ openssl verify -CAfile trusted.cer
Hello,
>I am trying to use OpenSSL to encrypt/decrypt some data for that
> I am using EVP_* API. I have a question about EVP_En/DecryptUpdate function.
> The second param of these functions is a pointer to a buffer where the
> En/Decrypted data will be copied by the function, but I wa
Hello,
>
> Thanks for your reply.
> I think the libssl.a and libcrypto.a should be ok. Maybe myAPI.a had
> failed to link libssl.a and libcrypto.a into itself?
> Later I try another way: when I make myUI, I link to not only
> myAPI.a, but also libssl.a and libcrypto.a all. It seems that the
Hi Team! All!
I'm just googled to death and need help on this one.
Server 2003
Exchange 2003
Latest patches...all of them..
Last year I generated cert requests with the
certutil -new myserver.inf myservers.req
When generating the certificate I use extendedKeyUsage
= 1.3.6.1.5.5.7.3.1 for Serv
Does anyone have a step-by-step guide for getting an OpenSSL root
authority and a Microsoft Issuing CA working? I have it working to the
point of getting the root and issuing CA created, but when I try to
issue web server certificates, it doesn't work. Further research
revealed that it was becaus
12 matches
Mail list logo