Hi All,
I just wanted to know how the Digital Signature is
calculated for the Client Certificate using the Client
Certificate & Private Key files i.e. how the following
items are derived from the certificate data
1. Hash algorithm to generate a fix length hash value
2. The data on which the hash
> The problem is that you send 'ssl on', then immediately switch to SSL
> mode,
>and then send the first part of the SSL handshake. When the server goes to
>receive the data, it receives 'ssl on\n' and recognizes the
>'ssl on' and turns on SSL mode. But that chunk of the SSL handshake has
>
> Okay, interesting development. If I put a sleep(5); on the C client
> before I issue SSL_connect (but after I BIO_write "ssl on\n"),
> everything works fine. Otherwise both client and server deadlock on
> read/recv.
Makes perfect sense. The problem is that the server has already receive
Okay, interesting development. If I put a sleep(5); on the C client
before I issue SSL_connect (but after I BIO_write "ssl on\n"),
everything works fine. Otherwise both client and server deadlock on
read/recv.
Ray Russell Reese III wrote:
>There seems to be a problem with the client however. I s
How to create signature file in .p7s format ?
The 'smime' command with -sign and -outform DER should do that.
Steve,
thank you.
I signed myscript.out file using commands:
openssl genrsa -out privkey.pem 1024
openssl req -sha1 -new -x509 -config openssl.cnf -key privkey.pem -out
mycert.crt -days 1
Bonsoir,
Hodie III Kal. Mai. MMV est, Antonio Ruiz Martínez scripsit:
> I'm seeing the structure generated by OpenSSL in a OCSPRequest. However, from
> my point of view it doesn't accomplish with the standar because there is not
> any number of the version. Is it correct?
[...]
> TBSRequest ::
Hello!
I'm seeing the structure generated by OpenSSL in a OCSPRequest. However, from
my point of view it doesn't accomplish with the standar because there is not
any number of the version. Is it correct?
Here I attach the result of the structure genereated:
0 SEQUENCE[C] = 2 elements
0 0 SEQ
Steve,
Dr. Stephen Henson wrote:
[snip]
>>Here are the relevant chunks for code. I'm trying to give enough code
>>without over-burdening you. If you need more, let me know.
>>
>
> [snip]
>
> Here's one problem:
>
>
>>EVP_CIPHER_CTX_set_key_length(&Dctx, 128);
>
>
> the length para
On Fri, Apr 29, 2005, Andrus wrote:
> I need to sign a file for downloading into pinpad.
>
> Pinpad requires signature as separate file with .p7s extension. It can also
> load certificate used for signature checking.
>
> How to create signature file in .p7s format ?
>
> Hex dump of some of th
Victor Duchovni <[EMAIL PROTECTED]> writes:
> On Fri, Apr 29, 2005 at 09:45:08AM +0200, Jostein Tveit wrote:
>
>> The same file copied with cygwin scp to my windows box:
>>
>
> Thereby globally changing to ...
That does not explain the difference between openssl md5 and the
md5sum command.
The
I need to sign a file for downloading into pinpad.
Pinpad requires signature as separate file with .p7s extension. It can also
load certificate used for signature checking.
How to create signature file in .p7s format ?
Hex dump of some of the existing p7s file looks as follows:
30 82 01 81 06 09
On Fri, Apr 29, 2005 at 09:45:08AM +0200, Jostein Tveit wrote:
> $ uname -a
> SunOS bid-dev22 5.8 Generic_117350-08 sun4u sparc SUNW,Sun-Fire-V240
> $ openssl version
> OpenSSL 0.9.6g 9 Aug 2002
> $ openssl md5 test
> MD5(test)= 2cbba5a2632ae92aa4f10003f7970082
> $ md5 test
> MD5 (test) = 2cbba5a2
In addition to -des3; -aes128 -aes192 or -aes256 are optional too.
Oliver
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of James
Wilde
Sent: 29 April 2005 13:36
To: openssl-users@openssl.org
Subject: RE: Change password on RSA key
> Subject: Re: Change
> Subject: Re: Change password on RSA key
>
>
>
> openssl rsa -in oldkey.pem -out newkey.pem -des3
Ah, thanks, Steve. -des3 I didn't see.
//James
__
OpenSSL Project http://www.openssl.org
User
On Mon, Apr 25, 2005, Sean Covel wrote:
> Now that I've updated to the latest OpenSSL (7g) I've got a question:
>
> I implemented some RC4 functionality using the low-level rc4 functions.(
> RC4_Set_Key, RC4), and its working fine.
>
> The OpenSSL documentation recommends using the EVP_* functio
On Fri, Apr 29, 2005, James Wilde wrote:
> I've gone through the obvious places in the openssl documentation and
> done a bit of googling but nothing has come to light.
>
> Is it possible to create an RSA key pair and subsequently change the
> password of the private key? I have found out how to
I've gone through the obvious places in the openssl documentation and
done a bit of googling but nothing has come to light.
Is it possible to create an RSA key pair and subsequently change the
password of the private key? I have found out how to take the password
away completely, and I've tried s
Hodie III Kal. Mai. MMV est, David C. Partridge scripsit:
> 3.2 million certs! That's going to be "fun" when you get to certificate
> rollover time!!!
We've got a 5 millions certs' CA in production... That's good.
This CA has a 40MB CRL. That's bad. :(
> What CA you using (I guess not openssl c
3.2 million certs! That's going to be "fun" when you get to certificate
rollover time!!!
What CA you using (I guess not openssl ca for that volume).
Dave
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of ray v
Sent: 29 April 2005 05:00
To: openssl-users@
Hi,
Can someone please explain the following behaviour?
On my Solaris box:
$ uname -a
SunOS bid-dev22 5.8 Generic_117350-08 sun4u sparc SUNW,Sun-Fire-V240
$ openssl version
OpenSSL 0.9.6g 9 Aug 2002
$ openssl md5 test
MD5(test)= 2cbba5a2632ae92aa4f10003f7970082
$ md5 test
MD5 (test) = 2cbba5a263
20 matches
Mail list logo