:
OpenSSL version is 1.0.1g.
Best Regards,
Alexander Komyagin
. -port :::8080), but that didn't help
(although it does work with 0.9.81 just fine).
Many thanks,
Steve
--
Best wishes,
Alexander Komyagin
__
OpenSSL Project http://www.openssl.org
http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager majord...@openssl.org
--
Best wishes,
Alexander Komyagin
X-Git-Url: http://git/git
diff --git a/recipes/openssl/openssl-1.0.1a/ocsp-support.patch b
-passin
pass:testing123
I get this error:
openssl: can't resolve symbol 'X509_sign_ctx'
Does anyone know what that means?
Thanks,
EV
--
Best wishes,
Alexander Komyagin
__
OpenSSL Project
you much).
--
Best wishes,
Alexander Komyagin
diff --git a/apps/apps.c b/apps/apps.c
index 4e11915..47f8c2f 100644
--- a/apps/apps.c
+++ b/apps/apps.c
@@ -2338,8 +2338,12 @@ int args_verify(char ***pargs, int *pargc,
flags |= X509_V_FLAG_CB_ISSUER_CHECK;
else if (!strcmp(arg, -crl_check
?),. Is it possible to load all client certificate? which
openSSL api shoud I use ffor this?
Thanks a lot,
Lloyd
--
Best wishes,
Alexander Komyagin
__
OpenSSL Project http://www.openssl.org
/SSL_CTX_load_verify_locations.html
On Mon, 2012-06-04 at 15:14 +0530, Lloyd wrote:
Thanks Alexander Komyagin,
So it means in mutual authentication mode also, each client and server
need only to load its only private key and public key. During SSL
handshake the SSL protocol will share the public
, 2012-06-04 at 15:53 +0530, Lloyd wrote:
Thanks again...
In my case I am using SELF SIGNED CERTIFICATES, totally eliminating
CA. So, is it possible to check both sides without a CA?
Thanks for your help
Lloyd
On Mon, Jun 4, 2012 at 3:45 PM, Alexander Komyagin komya...@altell.ru
://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager majord...@openssl.org
--
Best wishes,
Alexander Komyagin
__
OpenSSL Project