Dr. Stephen Henson wrote:
X509_get_pubkey() is useful for those cases: it just isn't complete.
You can check to see if parameters are missing using:
EVP_PKEY_missing_parameters(key);
You can copy parameters using:
EVP_PKEY_copy_parameters(to, from);
So before you replace the working_key with
On Wed, Jun 22, 2005, soukyan wrote:
> Dr. Stephen Henson wrote:
> >X509_get_pubkey() is useful for those cases: it just isn't complete.
> >
> >You can check to see if parameters are missing using:
> >
> >EVP_PKEY_missing_parameters(key);
> >
> >You can copy parameters using:
> >
> >EVP_PKEY_copy_
Dr. Stephen Henson wrote:
On Tue, Jun 21, 2005, Nick G. wrote:
Hello,
I have a need to read an encrypted RSA Private Key generated using
openssl with a java program. I have included some background at the end
of this message, but my question is basically: how is the pass phrase
converted int
Strictly speaking 1.2.840.113549.1.5.13 is the OID for the "PBES2 encryption
scheme" from PKCS#5 V2.
Dave
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listope
On Wed, Jun 22, 2005, Nick G. wrote:
>
> WRT Apache I did verify that OpenSSL can read the keys I created using:
>
> openssl genrsa -out clr.rsa 1024
> then
> openssl pkcs8 -v1 PBE-MD5-DES -in clr.rsa -topk8 -out enc.des.v1.pkcs8
> or
> openssl pkcs8 -v2 des -in clr.rsa -topk8 -out enc.des.v2.
Dr. Stephen Henson wrote:
On Wed, Jun 22, 2005, soukyan wrote:
Now I have another question.
When I print policy mapping extension with X509V3_EXT_print() I get:
0:d=0 hl=2 l= 26 cons: SEQUENCE
2:d=1 hl=2 l= 24 cons: SEQUENCE
4:d=2 hl=2 l= 10 prim: OBJECT:2.16.840.1.101.3.2.1.4
I have an older machine that appears to be "slapper" vulnerable.
During the make of openssl-0.9.8-beta5, I get the following error:
: undefined reference to `__ctype_b'
Google and list searches mention something about needing an older
version of glibc to fix? This doesn't make sense. I need to
On Wed, Jun 22, 2005, soukyan wrote:
> Dr. Stephen Henson wrote:
> >On Wed, Jun 22, 2005, soukyan wrote:
> >>Now I have another question.
> >>When I print policy mapping extension with X509V3_EXT_print() I get:
> >>
> >>0:d=0 hl=2 l= 26 cons: SEQUENCE
> >>2:d=1 hl=2 l= 24 cons: SEQUENCE
> >>4:
Hi
I'm try to add multiple caIssuers and OCSP entries to my
authorityInfoAccess attribute and I am having some difficulties with
getting the right openssl.cnf syntax. I want to add the following (Note
LDAP URIs and nasty commas)
caIssuers;http://server1.domain/certs/ca-certs.p7b
caIssuers;h
On Thu, Jun 23, 2005, Dr. Rodney McDuff wrote:
> Hi
> I'm try to add multiple caIssuers and OCSP entries to my
> authorityInfoAccess attribute and I am having some difficulties with
> getting the right openssl.cnf syntax. I want to add the following (Note
> LDAP URIs and nasty commas)
>
> ca
Did you got any break through.
Sorry, didn't read this list for a while. Actually, the code I put up in my
question
was correct. The problem was with a Base64 lib that I linked with in C++.
The implementation of the library has a small bug, which does not handle
the '+' char properly.
That'
To rule out any problems with your OpenSSL code I'd suggest you check the
signatures using the dgst command and if there are problems analyze them
using
rsautl.
Thanks for the reply. I got it, by examining basically every function that
touches
my data. So, in the end, it was the base64 libr
My case is different. Here it is failing bcz of extra SMIME
capability attribute present in Signature.
I removed it, it is working fine.
Thank you very much for reply
-Madhu
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf
13 matches
Mail list logo