Ulrich Matejek wrote:
Hi everybody,
when experimenting with OpenSSL v0.9.9 (since that version allows
choosing the digest algorithm when creating a PKCS#7 structure) I
encountered an odd behaviour: no matter what argument was specified for
the -md parameter, the resulting PKCS#7 structure had
Hi,
I don't know is it a right forums to discuss about the question? If it
is wrong please suggest the forum.
I am looking for "openssl accelerator". Is any body know any
free implementation / projects. Please send me the link.
Thanks,
Senthilkumar.
I will be out of the office starting 12/16/2006 and will not return until
01/02/2007.
I will respond to your message when I return. If you require immediate
assistance, please contact the Campus Help Desk at [EMAIL PROTECTED]
On Sat, Dec 16, 2006 at 04:43:52PM +0530, bsenthil wrote:
Hi,
I don't know is it a right forums to discuss about the question? If it
is wrong please suggest the forum.
I am looking for openssl accelerator. Is any body know any free
implementation / projects. Please send me
On Fri, Dec 15, 2006, Kyle Hamilton wrote:
I'm trying to retrace your steps to figure out where the bug could be
(and honestly, the diagnostics are not that helpful). However, there
is one more thing that I would like you to check: Is the file
./ca-cert.pem in place, and does it contain a
If ca-cert.pem does not start with:
-BEGIN CERTIFICATE
or
-BEGIN TRUSTED CERTIFICATE
then it got corrupted. You need to recopy it from one of your
end-entity systems that has it as a trust anchor.
This is the issue, and is what's causing the problem.
-Kyle H
On 12/16/06, Alex
For setup of a Postfix box that will serve multiple virtual domains, I
would like to generate one cert for all hostnames at which this box will
be able to be reached.
Following an example in a post from Victor Duchovni [0], I configured the
subjectAltName parameter in openssl.cnf with four
On Sat, Dec 16, 2006 at 03:35:45PM -0800, David Newman wrote:
openssl ca -out certs/lance-cyrus.pem \
-in csrs/lance-cyrus.csr -config ./openssl.cnf \
-extensions server
You need to arrange for the CA to include the SubjectAlternativeName
extension values in the signed cert...
For a