Title: : Your Weekly Fortune is Here. : 12ji.com :
It is indeed.
The reason load_verify_locations(ctx, 0, caPath) isn't working as expected, is
because that method places requirements on how the certificate files in there
are named.
When you run load_verify_locations(ctx, caFile, 0), all certificates are in
caFile are loadad and added to your
REMOVE
---
http://www.freemail.gr - äùñåÜí õðçñåóßá çëåêôñïíéêïý ôá÷õäñïìåßïõ.
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
REMOVE
---
http://www.freemail.gr - äùñåÜí õðçñåóßá çëåêôñïíéêïý ôá÷õäñïìåßïõ.
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
REMOVE
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
Remove
Hi again. EVP_SealInit() returns 0 when an error occurs (that's what the
man page says :)). Then... why it returns a 0 value when npubk==0?? This
is not necessary wrong. For example, when i set RC4's key length.
EVP_OpenInit() returns 1 if the private key is NULL... this is what's
expected.
Title: CertificateExtensions (id-ce) definition problem
Let me preface all of this with I think I have this right...
The 0.9.6b distribution contains the following in Objects.h: (~line 455)
#define SN_ld_ce ld-ce
#define NID_ld_ce 81
#define OBJ_ld_ce 2L,5L,29L
If you recreate the
Hi,
I'm newby, so I hope not to bother you with some stupid question or
misunderstud concepts.
I have been reading information of how to verify server certificate
signed by a root CA in a client.
Form what I read, I have to check the server certificate signature with
the
Hi,
I am just starting on my thesis which involves ssh and ssl
usage.
I was running the CA.pl script. I created a new CA,
and then i created certificate sign request and finally when
I did ./Ca.pl -signreq, it gave me the following error
CA.pl -newca -worked
CA.pl -newreq -worked
CA.pl
10 matches
Mail list logo