self-signed SSL certificates and trusted root certificate

2010-05-28 Thread Vieri
Hi, I'm trying to self-sign SSL certificates for corporate web servers. It seems to work fine except for installing the the CA certificate into the client's trusted root certificate store. The idea is to do something similar to CAcert.org's root certificate

I don't know to make an Engine to use within OpenSSL application

2010-05-28 Thread Nacho Álvarez
Hello I know how to do an engine implementation that overwrite OpenSLL functionality (like RSA sign and verify, ...) but I want to do an implementation (dll) can be called from OpenSSL (through OpenSSl config file). How do I build this dll for OpenSSL? I don't know the structure of these DLLs.

Certicate signature failure BC created SMIME

2010-05-28 Thread Niels Stevens
Hey everybody, I have the next problem, I created a C++ library that checks a SMIME and it's PKCS7 content. I used some boost test to test it in C++ and it worked perfectly . Now I want to check my SMIME that I created using Bouncy Castle in Java, also their I used JUnit test to verify the

OpenSSL and Windows

2010-05-28 Thread Jamrock
I have been using OpenSSL for a few years. I have mostly used it to encrypt OpenLDAP data. Recently I started using it to encrypt Postfix queries from a Linux box to Active Directory on a Windows box. I used Microsoft's article 321051 How to enable ldap over ssl with a third-party certification

OpenSSL with OpenPGP

2010-05-28 Thread vMan85
is there any way to use an OpenPGP public key with OpenSSL encryption ? -- View this message in context: http://old.nabble.com/OpenSSL-with-OpenPGP-tp28707336p28707336.html Sent from the OpenSSL - User mailing list archive at Nabble.com.

RE: human readable certificate verify error messages?

2010-05-28 Thread Dave Thompson
From: owner-openssl-us...@openssl.org On Behalf Of Dallas Clement Sent: Wednesday, 26 May, 2010 22:03 Is there a function that translates certificate verify return codes? x509.h, x509/x509_txt.c const char *X509_verify_cert_error_string(long n)

RE: max length to encrypt: direct RSA

2010-05-28 Thread Dave Thompson
From: owner-openssl-us...@openssl.org On Behalf Of Chuck Pareto Sent: Thursday, 27 May, 2010 16:20 I'm still unsure as to the max length string I can use to encrypt. I'm using the rsacrypto class in .net to encrypt. I know I can't pass in a string that's 256 bytes long or greater

Re: human readable certificate verify error messages?

2010-05-28 Thread Dallas Clement
Perfect. Thanks very much! On Fri, May 28, 2010 at 3:14 PM, Dave Thompson dthomp...@prinpay.com wrote: From: owner-openssl-us...@openssl.org On Behalf Of Dallas Clement Sent: Wednesday, 26 May, 2010 22:03 Is there a function that translates certificate verify return codes? x509.h,

How to make a legit CA cert?

2010-05-28 Thread Dallas Clement
This is probably a dumb question, but if I wanted to be come the next Verisign of this world, how do I create a legitimate CA cert? I'd like to be able to create my own that passes verification without throwing errors, like unknown CA. Thanks, Dallas

RE: How to make a legit CA cert?

2010-05-28 Thread Rene Hollan
You get browser providers to add your root CA cert to their list of inherently trusted certs. Failing that, you have your users import your root CA cert to their trusted authority list once. -Original Message- From: owner-openssl-us...@openssl.org on behalf of Dallas Clement Sent: Fri

RE: Public Certificate Signature

2010-05-28 Thread Dave Thompson
From: owner-openssl-us...@openssl.org On Behalf Of Emre Erisgen Sent: Thursday, 27 May, 2010 12:21 How do I encrypt SHA-1 hash value of my public certificate with private key of my certificate? I assume you mean an RSA key, because that's the only kind that is certified

RE: self-signed SSL certificates and trusted root certificate

2010-05-28 Thread Dave Thompson
From: owner-openssl-us...@openssl.org On Behalf Of Vieri Sent: Friday, 28 May, 2010 03:08 I'm trying to self-sign SSL certificates for corporate web servers. It seems to work fine except for installing the the CA certificate into the client's trusted root certificate store. FYI: