I can not sign a request containing latin characters with the msb set.
Openssl will escape the characters even i I set -esc_msb in the config file.
I made a request containing norwegian characters and tried the
following command:
openssl ca -spkac test.spkac
Setting the option
name_opt
On Mon, Nov 21, 2005, yvind Jelstad wrote:
I can not sign a request containing latin characters with the msb set.
Openssl will escape the characters even i I set -esc_msb in the config file.
I made a request containing norwegian characters and tried the
following command:
openssl ca
On Fri, Nov 11, 2005, Katie Lucas wrote:
We're creating custom extensions, so I went off and registered us an
OID under {2.25} to use. It's a UUID OID, so it's quite a long
numerical string.
Please try the latest 0.9.8 snapshot. This should fix the issue.
Steve.
--
Dr Stephen N.
Can someone please tell me why my server application does not cache a
session if It set the options to the following?
SSL_CTX_set_session_cache_mode( ctx, SSL_SESS_CACHE_SERVER );
and I don't set the callback functions:
SSL_CTX_sess_set_new_cb( ctx, NewSessionCallBack );
Perry L. Jones wrote:
Can someone please tell me why my server application does not cache a
session if It set the options to the following?
SSL_CTX_set_session_cache_mode( ctx, SSL_SESS_CACHE_SERVER );
and I don't set the callback functions:
SSL_CTX_sess_set_new_cb( ctx,
Hi,
I am trying to add SSL to a propriatory tcp/ip application. I am
reasonably confident in the programming side but I am utterly confused
with regards to certificates. The more I read about this the more
confused I get :-(
I hope someone can help me understand how to set things up.
We have
Sorry I left that line out yes I have set that too, maybe 10 is not a
good value to set in this functions?
SSL_CTX_set_session_id_context( ctx, Server, 10 )
Perry
Arno Garrels wrote:
Perry L. Jones wrote:
Can someone please tell me why my server application does not cache a
session if
Certificates are a lot like pgp keys with one difference the public key
has be wrapped with the Public Key infrastructure (PKI). So a public
cert will not only contain the public key but it will also contain
information about what the key can be used for (signing, encrypting,
server, client,
Mark,
I am assuming that you are aware of the need for certificates (need for
public key Cryptography).
Now reg ur query on creating those files to set up a CA, the need for a
CA (in u r client server arch and very simple terms) is to provide all
the clients with some credentials that will
Hi Dinesh All,
Now the different files u need to create for setting up the CA,
ok, I think understand the purpose of the files cacert.pem (public key),
private/cakey.pem (private key), index.txt and serial.
What I don't understand is what files require signing and what to do
with the
Mark,
I am not sure why you would want to sign the private key but I am sure
there might be a reason some where.
All you should need to sign is the certificate request (cert.req) after
signing the certificate request it is likely that you will want to put
your related certificates and keys
1) you create a private key ( this is the secret key ... )
2) you create a public key corresponding to the private key. This key
can not be reversed to get a private key, tat is the main advantage of
public key cryptography.
Ok. I understand this. Would the following command do these two
I have been trying to figure this out for days now and can't seem to
find the solution? Someone please give me guidance or I am going to cry!
I have a server application using session caching. I have used the
following function to setup session caching:
SSL_CTX_set_session_id_context( ctx,
Mark wrote:
1) you create a private key ( this is the secret key ... )
2) you create a public key corresponding to the private key. This key
can not be reversed to get a private key, tat is the main advantage of
public key cryptography.
Ok. I understand this. Would the following
HI:
I am trying to use ssl to secure a persistent data stream which is read
form some sensors outside, and transfer it to a fixed pc on the interent.
The most common use of ssl is Https,but i am confused that can https
realize this application? i mean , as i know ,the Https is always works in
Title: Can SSL_accept() return SSL_ERROR_WANT_READ/WRITE for blocking sockets?
SSL_accept() is returning = 0. And when I trace out the err msg using the following code
int iRet = SSL_accept(m_pSSL);
if (iRet = 0)
{// handshake failed
char buf[256];
When you say data stream, how much data are you talking about?
If it's occasional data (e.g., updated every 5 minutes) it would
probably be easiest to use a HTTPS client using a post form.
That lets you use a standard web server on the other end. One
less thing to worry about.
Another
17 matches
Mail list logo