Re: ECSDA and digest algorithm OID in OpenSSL 0.9.9

2006-12-16 Thread Nils Larsch
Ulrich Matejek wrote: Hi everybody, when experimenting with OpenSSL v0.9.9 (since that version allows choosing the digest algorithm when creating a PKCS#7 structure) I encountered an odd behaviour: no matter what argument was specified for the -md parameter, the resulting PKCS#7 structure had

free openssl accelerator

2006-12-16 Thread bsenthil
Hi, I don't know is it a right forums to discuss about the question? If it is wrong please suggest the forum. I am looking for "openssl accelerator". Is any body know any free implementation / projects. Please send me the link. Thanks, Senthilkumar.

Jesse Santana/AdminFinance/CSULB is out of the office.

2006-12-16 Thread Jesse Santana
I will be out of the office starting 12/16/2006 and will not return until 01/02/2007. I will respond to your message when I return. If you require immediate assistance, please contact the Campus Help Desk at [EMAIL PROTECTED]

Re: free openssl accelerator

2006-12-16 Thread Girish Venkatachalam
On Sat, Dec 16, 2006 at 04:43:52PM +0530, bsenthil wrote: Hi, I don't know is it a right forums to discuss about the question? If it is wrong please suggest the forum. I am looking for openssl accelerator. Is any body know any free implementation / projects. Please send me

Re: [EMAIL PROTECTED]: Bug report]

2006-12-16 Thread Dr. Stephen Henson
On Fri, Dec 15, 2006, Kyle Hamilton wrote: I'm trying to retrace your steps to figure out where the bug could be (and honestly, the diagnostics are not that helpful). However, there is one more thing that I would like you to check: Is the file ./ca-cert.pem in place, and does it contain a

Re: [EMAIL PROTECTED]: Bug report]

2006-12-16 Thread Kyle Hamilton
If ca-cert.pem does not start with: -BEGIN CERTIFICATE or -BEGIN TRUSTED CERTIFICATE then it got corrupted. You need to recopy it from one of your end-entity systems that has it as a trust anchor. This is the issue, and is what's causing the problem. -Kyle H On 12/16/06, Alex

subjectAltName setup

2006-12-16 Thread David Newman
For setup of a Postfix box that will serve multiple virtual domains, I would like to generate one cert for all hostnames at which this box will be able to be reached. Following an example in a post from Victor Duchovni [0], I configured the subjectAltName parameter in openssl.cnf with four

Re: subjectAltName setup

2006-12-16 Thread Victor Duchovni
On Sat, Dec 16, 2006 at 03:35:45PM -0800, David Newman wrote: openssl ca -out certs/lance-cyrus.pem \ -in csrs/lance-cyrus.csr -config ./openssl.cnf \ -extensions server You need to arrange for the CA to include the SubjectAlternativeName extension values in the signed cert... For a