Hi All,I'm working on a GUI software application to OpenSSL for the Windows
platform I'd like to share with you. It's not yet finished and I'd like your
feedback on it regarding interface, functionality, etc. It supports OpenLDAP to
store the certificates. I'd like to know if there is any other
On Sun, Jul 6, 2008 at 4:48 PM, Hacker SF <[EMAIL PROTECTED]> wrote:
> You can download the soft from here:
> http://www.limina.com.ar/Downloads/RosPKI-EN-Demo.exe
LOL, asking users in a *security* list to download and run a random
executable from the Internet and without source code, I wonder how
Open an XP Vmware client, use it to test. When you're through run a decent
malware/virus detector to see if anything got infected. If not, then you
may be OK.
Jim.
On Sun, Jul 6, 2008 at 8:32 AM, Vishal Rao <[EMAIL PROTECTED]> wrote:
> On Sun, Jul 6, 2008 at 4:48 PM, Hacker SF <[EMAIL PROTECTED
You must also check for RootKits which are harder to detect and always run
under an account with no privilege.
As far as I am concerned, I will use Wine under Linux to try this executable.
--
Mounir IDRASSI
IDRIX
http://www.idrix.fr
On Sun, July 6, 2008 2:54 pm, Jim Lynch wrote:
> Open an XP Vmw
On Sun July 6 2008 08:13, Mounir IDRASSI wrote:
> You must also check for RootKits which are harder to detect and always run
> under an account with no privilege.
> As far as I am concerned, I will use Wine under Linux to try this executable.
>
Wine inside a Linux-VServer context is even better.
And he has got a name to match it too. ;)
P.S.: I do know the difference between a hacker and a cracker, but could'nt
resist it. :)
On Sun, Jul 6, 2008 at 6:02 PM, Vishal Rao <[EMAIL PROTECTED]> wrote:
> On Sun, Jul 6, 2008 at 4:48 PM, Hacker SF <[EMAIL PROTECTED]> wrote:
> > You can download t
Thank you, Kyle Hamilton! We understand what you pointed out.
Since we are creating a C++ class abstraction (class "SslCertificate")
as a wrapper around a "X509*", we would like to add our "X509*" to the
list of trusted CA certificates.
Each "SslCertificate" object carries a "X509*" with it and n
Hi Konrad;
It sounds like you are reproducing what has already been done in
WvStreams, in the WvX509 and WvX509Mgr classes.
You may want to check both those, and the WvX509Path class in Pathfinder
which, IIRC, implements the X509 verification routines.
Have fun.
Patrick.
Konrad Kleine wrote:
>
Ok, I will check that.
Actually I am wondering, if we have to write our own verification like
here, if we want to verify using X509 pointers:
http://readlist.com/lists/openssl.org/openssl-users/0/4771.html
The "void validate_with_store()" in the above link is the only example I
found in this dir
On Sun, Jul 6, 2008 at 2:32 PM, Vishal Rao <[EMAIL PROTECTED]> wrote:
> On Sun, Jul 6, 2008 at 4:48 PM, Hacker SF <[EMAIL PROTECTED]> wrote:
>> You can download the soft from here:
>> http://www.limina.com.ar/Downloads/RosPKI-EN-Demo.exe
>
> LOL, asking users in a *security* list to download and ru
On Sun, Jul 06, 2008, Konrad Kleine wrote:
>
> Back to the point:
>
> 0)How can we get the X509-certificate store that we trust?
> Is this correct?
>
> SSL_CTX * context = ...
> X509_STORE * store = context->cert_store;
>
You should call X509_CTX_get_cert_store() a
11 matches
Mail list logo