Indeed. Downloading the intermediate CA bundle from Thawte and installing it as
a chain certificate file into Apache did the trick!
Thank you very much,
Ron Arts
Op 12 jan. 2011 om 05:17 heeft Dave Thompson dthomp...@prinpay.com het
volgende geschreven:
From:
Hi,
I use openssl-0.9.8q on netbsd and openssl-1.0.0c on debian Sid (with
experimetnal repo for openssl).
I can't manage to have openssl verify ECDSA signatures on netbsd,
although it works well on debian.
Here is the command that reproduces the error :
openssl dgst -sha256 -sign (openssl
Hi,
I am trying to verify signature created in unix and verifying in PHP.
Followed below steps in unix.
openssl genrsa -des3 1024 private.key
openssl req -new -x509 -nodes -md5 -key private.key public.key
*message* = Hi,This is just gonna be a sample message with digital signature
openssl
Steve Marquess
marqu...@opensslfoundation.com writes:
Henrik Grindal Bakken wrote:
It's not really a fork; we do it mostly with a) configuration, and
b) limiting algorithms in our own code. We do have some patches,
though, and I suppose the best way forward is to pull in the tests
from the
On Tue, Jan 11, 2011 at 07:23:54PM +0100, Erwann ABALEA wrote:
In order to be referenced by browser vendors (Opera comes to mind, and
I think Mozilla will require this), the serial number MUST be random
(or at least *appear* random from the outside).
Oh, now I'm curious. How do they test the
On Tue, Jan 11, 2011 at 05:39:19PM +0100, Fredrik Strömberg wrote:
Hello Patrick,
Thank you for your email. I somehow managed to miss the word
mandatory in the manual. I guess there´s nothing else for me to do
than code a file lock. I need to run multiple openssl instances, and
openssl
Hi,
i'm developing and using openssl 1.0.0.
I've to force the client to not use secure renegotiation. Is there any
flag how I can disable secure renegotation and force unsecure
renegotiation (e.g. pre 0.9.7m style).
best regards,
Ralf Mendez
Hodie pr. Id. Ian. MMXI, Mark H. Wood scripsit:
On Tue, Jan 11, 2011 at 07:23:54PM +0100, Erwann ABALEA wrote:
In order to be referenced by browser vendors (Opera comes to mind, and
I think Mozilla will require this), the serial number MUST be random
(or at least *appear* random from the
On 1/12/2011 6:48 AM, Mark H. Wood wrote:
Oh, now I'm curious. How do they test the randomness of a single
sample? 1 is every bit as random (or nonrandom) as
0xdcb4a459f014617692d112f0942c89cb.
They don't validate the number itself, they validatet hat the method by
which the number was
Hi,
I am able to generate the RSA private keys by RSA_generate_key_ex. I need
to store it into a buffer for internal processing. Can you please suggest me
to convert RSA a key into buffer. I had seen the examples to dump into file.
Instead of file processing I need to convert RSA private key into
Hi All,
I hope this a basic question for you guys..
I'm trying to setup TLS connection between Client and Server.
In the server i did following things,
1. Created a selfsigned rootCA
2. Created IntermediateCA and signed with rootCA.
3. Create a Server Certificate and signed with intermediateCA.
sorry, I misunderstand your request for internal processing. the previous
functions which I memtioned can't be processing.
I think this will be better.
RSA *pub_key = NULL;
pub_key = readPublicKey(); // to read a public key from a file ,you can use
your own function to get a rsa object
RSA * d2i_RSAPublicKey(RSA **a, unsigned char **pp, long length);
int i2d_RSAPublicKey(RSA *a, unsigned char **pp);
RSA * d2i_RSA_PUBKEY(RSA **a, unsigned char **pp, long length);
int i2d_RSA_PUBKEY(RSA *a, unsigned char **pp);
RSA * d2i_RSAPrivateKey(RSA **a, unsigned char **pp, long length);
int
Bonjour All,
First i explain the scenarion. My domain name is lets say idtech.com. Under it
i
have created an ou=certificate users. Users are created under this OU.
So my FQDN of a user is CN=scott,OU=Certificate Users,DC=idtech,DC=com. Same
FQDN is in the subject of the user certificate SC
14 matches
Mail list logo