On Wed, 15 Dec 1999, you wrote:
Documentation (very minimal) and source code are at the
following address
http://spsl.security.unisa.it
Did you port db 1.85 on Win 32bit systems?
Regards Rene
--
---
Rene G. Eberhard
On the same issue:
We've found a way to add any arbitrary CA certificate into certificate
database of Netscape Communicator (on Win32 only) in a way completely
transparent to users. I mean, no UI warnings or questions at all.
If anyone is interested, I can e-mail the code.
P.S. Please, note,
Massimiliano Pala wrote:
Mario Fabiano wrote:
openssl ca -revoke asks for the CA key protection password, but the CA
key should be needed only to issue the CRL thst must be signed.
NO. As the CA, from now on will consider the certificate REVOKED and in
every CRL issued will mark it as R.
Michael Pogrebisky wrote:
We've found a way to add any arbitrary CA certificate into certificate
database of Netscape Communicator (on Win32 only) in a way completely
transparent to users. I mean, no UI warnings or questions at all.
If anyone is interested, I can e-mail the code.
Across a
Excuse me if my questions appear too obviuos for you.
This is my problem:
- I have my private key.
- I have a string.
- I have to sign this string with my private key using md5.
- I have made a small C program to do this.
I put here some lines of it:
...
EVP_MD_CTX ctx;
EVP_PKEY *pkey;
...
Hi,
I'm experimenting with the various cipher suites that OpenSSL 0.9.4
supports, and am having some problems understanding DH, EDH and ADH and how
to use them. I need someone to point me towards the light :-)
So far, using some simple home-brewed test programs, I've successfully
managed to
Hello,
I'm trying to figure out how to get s_client to present a client side
certificate when requested by and IIS web server.
so i believe the following syntax should work:
OpenSSLs_client -cert myCert.cer -key myPriv.key -connect
www.host.com:443
My problem is how to get the private key
Are you using overwriting the netscape.cfg or the certificate database?
On Thu, 16 Dec 1999, Michael Pogrebisky wrote:
On the same issue:
We've found a way to add any arbitrary CA certificate into certificate
database of Netscape Communicator (on Win32 only) in a way completely
md5 wrote:
Hello,
I'm trying to figure out how to get s_client to present a client side
certificate when requested by and IIS web server.
so i believe the following syntax should work:
OpenSSLs_client -cert myCert.cer -key myPriv.key -connect
www.host.com:443
My problem is how to
Yunhong Li wrote:
From my understanding, the client cert is transmitted in clear.
When server receives the client cert, server verifies the client
cert using a CA (or chained CAs), like verifying the date, signature,
etc. The question I have is that whoever could intercepts the client
cert
10 matches
Mail list logo