On Tue, Oct 25, 2005, David Brock wrote:
> Using X509_verify is there a way (programmatically) to tell if the
> certificate verification failed because of an unknown CA versus a
> corrupted certificate?
>
Depends on how the certificate is corrupted.
Some kinds of corruption will be trapped by
Using X509_verify is there a way (programmatically) to tell if the
certificate verification failed because of an unknown CA versus a
corrupted certificate?
Thanks,
-David-
__
OpenSSL Project
Dr. Henson,
Looks like the check on the >0 and not just != -1 did
the trick! Thank you for helping me!
Cheers!
--- "Dr. Stephen Henson" <[EMAIL PROTECTED]> wrote:
> On Tue, Oct 25, 2005, M G wrote:
>
> > Hi Dr. Henson,
> >
> > You were wondering what code I used to produce the
> > digest: I
Anders Björnerstedt (AS/EAB) wrote:
When downloading from the tarballs list, is it the case that the first choice
on each version
Is the "export version" ? and the other three (MD5) (SHA1) (PGP sign) are
restricted ?
It should be the MD5 sum, SHA1 sum and PGP signature respectively of the
On Tue, Oct 25, 2005, M G wrote:
> Hi Dr. Henson,
>
> You were wondering what code I used to produce the
> digest: I used my X509 certificate to get the
> fingerprint with GetSHAFingerprint() - then I wrote
> the X509 to PEM, then I read it back and called
> GetSHAFingerprint() again and receive
Hi Dr. Henson,
You were wondering what code I used to produce the
digest: I used my X509 certificate to get the
fingerprint with GetSHAFingerprint() - then I wrote
the X509 to PEM, then I read it back and called
GetSHAFingerprint() again and received a different
fingerprint. Is this supposed to
On Tue, Oct 25, 2005, Steffen Fiksdal wrote:
Hi!
What return code(s) from OCSP_basic_verify() signals that the
verification process went ok, regardless of any flags set ?
Anything >0 though at present it will only return 1 for success.
I see in the function that if ocsp_check_issuer() re
On Tue, Oct 25, 2005, Steffen Fiksdal wrote:
> Hi!
>
> What return code(s) from OCSP_basic_verify() signals that the
> verification process went ok, regardless of any flags set ?
>
Anything >0 though at present it will only return 1 for success.
Steve.
--
Dr Stephen N. Henson. Email, S/MIME a
Hi!
What return code(s) from OCSP_basic_verify() signals that the
verification process went ok, regardless of any flags set ?
Best Regards
Steffen Fiksdal
__
OpenSSL Project http://www.opens
Dr. Stephen Henson wrote:
On Tue, Oct 25, 2005, imana sakki wrote:
hello every one
in verisign I saw correctly (their web pages) they are actually selling certificates for 40
bit and for 128 bit encryption, what dose it mean? is there a parameter in the certificate that determines
On Tue, Oct 25, 2005, imana sakki wrote:
> hello every one
> in verisign I saw correctly (their web pages) they are actually selling
> certificates for 40
> bit and for 128 bit encryption, what dose it mean? is there a parameter in
> the certificate that determines the size of session key? if yo
Title: Export-version ?
When downloading from the tarballs list, is it the case that the first choice on each version
Is the "export version" ? and the other three (MD5) (SHA1) (PGP sign) are restricted ?
Anders Bjornerstedt
Ericsson
Hi,
I know that 0.9.7x version have probleme in dynamic loading.
especially IMPLEMENT_DYNAMIC_BIND_FN() function.
We have corrected this in our engine by re-defining this macro.
You should find a thread about this in mailing list archive.
Regards,
Fred
-Original Message-
From: Marco
hello every one
in verisign I saw correctly (their web pages) they are actually selling certificates for 40bit and for 128 bit encryption, what dose it mean? is there a parameter in the certificate that determines the size of session key? if you understand, please explain for me. I'm thank you ver
14 matches
Mail list logo