Dear all
I try many times in BMPString which I think it can
show my character(not english) but It show
So please suggest me the way to show other
character.
thank you
** Message from InterScan E-Mail VirusWall NT **
** No virus found in attached file noname.htm
Hi,
I'm having problems RSA-signing a previously-digested
message.
I'm trying to RSA-encrypt (with my RSA private key) a
very short binary string. (The plaintext binary string
is actually an MD5 hash, but previously stored, not
generated on-the-fly, so the hashing-context has not
been
blue wrote:
Dear all
I try many times in BMPString which I think it can show my
character(not english) but It show
So please suggest me the way to show other character.
This depends on what you are trying to display the characters with. If
your terminal supports UTF8 then you
Oscar Jacobsson wrote:
Hi!
From the SSL_CTX_load_verify_locations manpage:
If CApath is not NULL, it points to a directory containing CA certificates in
PEM format. The files each contain one CA certificate. The files are looked up
by the CA subject name hash value, which must hence be
Remove.
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
Remove
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
Amodhini,
Try calling SSLeay_add_all_algorithms at the top of main.
Frank
-Original Message-
From: Amodhini U [mailto:[EMAIL PROTECTED]]
Sent: Thursday, November 29, 2001 6:06 AM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: RSA-signing a previously-digested message
Only problem is that this is on Windows and the standard c_rehash wont
work.
In which case instead of making links you need to make copies. Using
Kermit script this can be done as
copy cert.pem {\fcommand(openssl x509 -hash -noout -in cert.pem).0}
I'm sure someone can write the
Dr S N Henson wrote:
Only problem is that this is on Windows and the standard c_rehash wont
work.
Ah.
Oh well, the functionality can be emulated quite easily by mimicking the script.
First make sure we can actually verify our cert directly by file:
openssl verify -CAfile ca.crt user.crt
Dr S N Henson wrote:
Only problem is that this is on Windows and the standard c_rehash wont
work.
Actually, after looking at the c_rehash code, and removing the (IMHO quite
redundant) stuff that sifts through the path and tries to find the openssl
command, it works just fine on windows, using
Hi,
I'm newbye. I have done a SSL client that connect to some HTTPS server.
The server have Verisign as CA root.
My question is: how can I validate/verify that the certificate I have
received from the HTTPS server is the certificate from Verisign? Can I
be sure if I only check the
Making sure that the server uses a certificate issued by verisign is a case of
using the SSL_CTX_load_verify_locations(...) function to add verisign's root as
a trusted certificate. There are actually quite a number of verisign roots,
but I digress...
You will definitely want to perform some
On Thu, 29 Nov 2001, Jeffrey Altman wrote:
Only problem is that this is on Windows and the standard c_rehash wont
work.
In which case instead of making links you need to make copies. Using
Kermit script this can be done as
copy cert.pem {\fcommand(openssl x509 -hash -noout -in
Thanks for all the reply. One point to note is that my
path contain only one file/cert, say file.pem. And I
have verified that this cert works, using:
_load_verify_locations(ctx,c:\\path\\file.pem,NULL).
However, _(ctx,NULL,c:\\path\\) does not work.
Do you think it is the rehash problem that
14 matches
Mail list logo