Hi all
I trying to create a csr (in a c program) that uses a hardware private
public key and I am accessing this token by pkcs11. However, the csr is
always invalid, with the following message:
$ openssl req -verify -in wltx.csr
verify failure
1996:error:0D07207B:asn1 encoding routines:ASN1_get
Hi all
I trying to create a csr (in a c program) that uses a hardware private
public key and I am accessing this token by pkcs11. However, the csr is
always invalid, with the following message:
$ openssl req -verify -in wltx.csr
verify failure
1996:error:0D07207B:asn1 encoding routines:ASN1_g
Hi
I am trying to generate a csr in a c program by having the signing part
done by pkcs11 calls, and while I get no errors, the resulting csr fails
upon validation:
$ openssl req -verify -in wltx.csr
verify failure
2948:error:0D07207B:asn1 encoding routines:ASN1_get_object:header too
long:.\
Hi Steve
Thanks a lot for your reply.
Just another quick question. Do you know by chance an openssl function
that would convert the raw sha1 into a digestinfo structure?
Kind regards
Tim
On 03/15/2013 02:36 PM, Dr. Stephen Henson wrote:
On Fri, Mar 15, 2013, Tim Tassonis wrote:
Hi
I
03:10 PM, Erwann Abalea wrote:
Bonjour,
Le 15/03/2013 14:07, Tim Tassonis a écrit :
Hi
I am trying to generate a csr in a c program by having the signing
part done by pkcs11 calls, and while I get no errors, the resulting
csr fails upon validation:
$ openssl req -verify -in wltx.csr
ver
Hi Stephen
Thanks a lot, that did the trick, the verify now returns ok.
Kind regards
Tim
On 03/18/2013 02:26 PM, Dr. Stephen Henson wrote:
On Mon, Mar 18, 2013, Tim Tassonis wrote:
Hi Erwann
What you have to do it hash your data, prepare an X509_SIG object, set
its "algor&quo
Hi
I've got to find out the keysize used in an S/MIME encrypted mail.
I looked around in the openssl code and tried the following:
X509_ALGOR *alg;
PKCS7 *p7;
int p7_type;
BIO *mail_bio *indata;
...
p7 = SMIME_read_PKCS7(mail_bio, &indata);
p7_type = OBJ_obj2nid(p7->type);
switch (p7_type) {
On Wed, 3 Mar 2004 08:53:48 +0100
<[EMAIL PROTECTED]> wrote:
> p7b file from entrust is simply a pkcs7 signed envelope that contains only
> certificates. You can use openssl function in order to open envelope and
> extract the certificates.
Such as
openssl pkcs7 -in bla.p7b -inform der -print_c
Tim
>
> Arun.
>
> ----- Original Message -
> From: "Tim Tassonis" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Friday, September 22, 2000 9:17 AM
> Subject: bad mac decode in ssl handshake
>
>
> > Hi
> >
> > When
> >
> > > In the worst case, can somebody point me to another free simmetric
> > > algorithm with a 128 bit key ???
> >
> > RC4 would be my recommendation.
> sorry but,
> according to openssl readme "RC4 is a trademark of RSA Security, so use
> of this label should perhaps only be used
> In a LDAP directory, certificates can be stored as binary
> data under the attribute "userCertificate".
>
> Which of the certificate formats that OpenSSL can produce is
> the correct one to use for this?
>
You can load a DER encoded x509 certificate with ldapmodify or so. Don't
forget to speci
Hi
I've got a question regarding crl formats.
Until now, I found two mime types for use with crl's:
"application/pkix-crl", which seems to be either a DER or PEM formatted
crl as in openssl crl.
"application/x-pkcs7-crl", which, I would guess at least by its name,
should be a pkcs7 file contai
12 matches
Mail list logo