Thanks for your help.
I'm new with Openssl and TimeStamping.
How did you define the TSAPolicyId. It's a ANS1_OBJECT but what is the OID
of this object ?
Michiels Olivier
-Original Message-
From: Peter Sylvester [mailto:[EMAIL PROTECTED]]
Sent: mardi 27 février 2001 18:42
To: [EMAIL PROTE
Massimiliano Pala wrote:
>
> Hi all,
>
> I am working on the ca.c command. I want to be able to pass
> a new subject to the ca command to issue the new certificate
> with the new subject.
>
> I've almost ended, anyway I get strange behaviour.
>
> In the ca command I have added a function to mo
Hi all,
I am working on the ca.c command. I want to be able to pass
a new subject to the ca command to issue the new certificate
with the new subject.
I've almost ended, anyway I get strange behaviour.
In the ca command I have added a function to modify the
req subject name so in the do_body it
Dr S N Henson wrote:
> The X509_REQ ASN1 routines cache the signed portion of a request to
> avoid possible signature errors with invalid encodings. Normally a
> request will not be modified after it has been signed or received so
> this doesn't matter. However in your case you are changing it so
Massimiliano Pala wrote:
>
> Hi all,
>
> I am trying to modify a request DN and save it into an
> alternate file/output.
>
> I have succeded in generating a new DN from a string and
> I get no error when using:
>
> if(!X509_REQ_set_subject_name ( req, n ))
> return(0);
Hi all,
I am trying to modify a request DN and save it into an
alternate file/output.
I have succeded in generating a new DN from a string and
I get no error when using:
if(!X509_REQ_set_subject_name ( req, n ))
return(0);
where the req is the loaded request and n is th
Hi !
I'd like to know how the "pre master secret" is generated when SSL use
DH Key Agreement.
I've read that the "shared secret" generated with the DH key agreement
is used to produce the "pre master secret" but their size are different,
so which bits of the "shared secret" are used ?
Thanks in
On Wed, Feb 28, 2001 at 10:53:57AM +0530, SRIDHAR BANDI wrote:
> Greetings ,
>
> This is my first time I am hitting this mailing list.
>
> When a client and server establishes a connection between them,
> They agree upon one symmetric key which they will use for
>
Olivier,
we have our experimental Timestamping based on the lastest draft of TSP,
For Instruction: http://195.223.2.6:8080
For HTTP test: http://195.223.2.6:8080/timestamp
For TCP test : tcp at 195.223.2.6, port 3318
You are welcome to test it.
We h