Title: Message
Hi,
I am trying to make pkcs7 encryption work
with capicom of Microsoft. I am
facing problem in it.
Steps I am
taking:
i)
I am
getting a DER encoded certificate from a MS client
ii)
I encrypt
the data on server with certificate using PHP function openssl_pkcs7_encrypt()
Hi Folks,
Using Perl5.8 with ithreads, the perl module
Net::SSLeay does not compile/make with
some/most/all versions of openssl up to and
including 0.9.6g ( also 0.9.6h ).
( it works without the ithreads ).
You can successfully compile/make this module with
Perl5.8 ithreads if you use
Hi,
With a DSA certificate, SSL handshakes always seem to fail if we use Netscape (version
6) browser. The packet trace seems to show that Netscape is not sending any DSS-based
ciphers in the client hello. Is there known support in a Netscape browser of any
version, or any patch etc, which will
On Fri, Oct 18, 2002, Shyamal Kumar wrote:
Hi,
With a DSA certificate, SSL handshakes always seem to fail if we use Netscape
(version 6) browser. The packet trace seems to show that Netscape is not sending any
DSS-based ciphers in the client hello. Is there known support in a Netscape browser
On Fri, Oct 18, 2002, Rohit Kumar wrote:
Hi,
I am trying to make pkcs7 encryption work with capicom of Microsoft. I
am facing problem in it.
Steps I am taking:
i) I am getting a DER encoded certificate from a MS
client
ii) I encrypt the data
My company has had great success with PRNGd. It basically takes
log files, and whatever else it can get its hands on to generate
a pool of random characters...
Anyhow, you can get it from here:
http://www.aet.tu-cottbus.de/personen/jaenicke/postfix_tls/prngd.html
It supports about any OS that
Make sure the browser has the necessary root and intermediate certificates
to verify the OCSP response. The local OCSP test has access to your cert
database, but Mozilla doesn't unless you explicitly provided them (by
sticking them into a PKCS7 when you imported the root cert, or imported
them
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello
I wonder if anyone can clarify the use of SSL_peek() and SSL_read() for me.
I'm using SSL_peek() to look at a SSL session and look at the waiting data,
but when I request a particular number of bytes from it with SSL_read() i hit
problems,
Hello,
I was doing some tests with openssl and I found a strange issue:
First, I ran s_server to instantiate a fake server in localhost:
s_server -cert mycertfile -key mykeyfile
Second, I execute s_client to connect to my fake server:
s_client -connect 127.0.0.1:4433
Until here, it's ok.
Hi,
I have a doubt regarding the Randomness generated using OpenSSL.
I have an application that uses OpenSSL for cryptographic operations
including generation of keys.
I used DieHard tool for getting a statistical analysis on the Randomness. Here
many tests are failing.
I am suspecting that
10 matches
Mail list logo