is in a private repository, as we are not sure yet, how
much rights google takes for using their services to develop code)
Michael
On Fri, Sep 25, 2009 at 9:46 PM, Victor Duchovni
victor.ducho...@morganstanley.com wrote:
On Fri, Sep 25, 2009 at 01:49:25PM +0200, Michael Prinzinger wrote
24, 2009 at 8:20 PM, Victor Duchovni
victor.ducho...@morganstanley.com wrote:
On Thu, Sep 24, 2009 at 08:03:49PM +0200, Michael Prinzinger wrote:
Dear Victor,
it is almost working.
with the cerify_callback function returning 1, I can establish a
connection.
However when I call
Thank You again Victor for your answer,
You are right, I am not to firm with OpenSSL terminology.
I tried to find some tutorials and introduction, but found relatively few,
and thus tried to understand OpenSSL from looking at the man pages and the
code,
which makes it a little hard to get the big
, Sep 24, 2009 at 5:08 PM, Victor Duchovni
victor.ducho...@morganstanley.com wrote:
On Thu, Sep 24, 2009 at 04:23:03PM +0200, Michael Prinzinger wrote:
Are you saying that the accepting system expects X.509 client
credentials
from the connecting system, but that the payload (encrypted
sorry!
I mean BIO_do_connect()
this function automatically checks the client verificate,
so I need to overwrite the verifiction callback BIO_do_connect uses
thx
On Thu, Sep 24, 2009 at 5:13 PM, Michael Prinzinger tay...@gmail.comwrote:
Thank You very much Victor,
I think I understand now how
Dear OpenSSL group,
I have a somewhat curious setting (without CAs) about routing information
along several nodes:
[1] first an unkown client establishes a connection to a known server
thus I set
SSL_CTX_set_verify(this-ctx, SSL_VERIFY_NONE, NULL);
and let the client verify the servers
will
extend my verification method by also checking the extensions.
I would be grateful, if you could help!
Michael
On Wed, Sep 23, 2009 at 10:18 PM, Victor Duchovni
victor.ducho...@morganstanley.com wrote:
On Wed, Sep 23, 2009 at 10:04:48PM +0200, Michael Prinzinger wrote:
and let
...@openssl.org [mailto:
owner-openssl-us...@openssl.org] *On Behalf Of *Michael Prinzinger
*Sent:* Wednesday, September 23, 2009 1:05 PM
*To:* openssl-users@openssl.org
*Subject:* verify client certificate at a later point
Dear OpenSSL group,
I have a somewhat curious setting (without CAs
Dear Victor,
On Wed, Sep 23, 2009 at 11:33 PM, Victor Duchovni
victor.ducho...@morganstanley.com wrote:
On Wed, Sep 23, 2009 at 10:43:11PM +0200, Michael Prinzinger wrote:
Certificates are useless without corresponding signed messages. What
messages are signed by the private key
again for pointing me in the right direction
Michael
On Fri, Sep 11, 2009 at 6:04 PM, Dr. Stephen Henson st...@openssl.orgwrote:
On Fri, Sep 11, 2009, Michael Prinzinger wrote:
Dear Group,
I want to use the openssl crypt library to sign and verify messages.
Apparently I can use a RSA
Dear Group,
I want to use the openssl crypt library to sign and verify messages.
Apparently I can use a RSA struct and RSA_sign and RSA_verify for that.
however my certificates are of the form
-BEGIN CERTIFICATE-
MIIDDTCCAnagAwIBAgIJAMWKwoNrQvTvMA0GCSqGSIb3DQEBBQUAMGMxCzAJBgNV
...
Dear group,
I require OpenSSL sockets and streams for my master thesis.
I wrote an OpenSSL server and client in C++ using the OpenSSL library.
Now currently I am trying to get the verification of certificates working,
but am facing some problems.
Everything works fine, when I set set_verify to
12 matches
Mail list logo