Deep copy of OCSP_RESPONSE

2006-06-05 Thread Stefan Vatev
What is the easiest way of making a deep copy of OCSP_RESPONSE. This is what I've thought of: bio = BIO_new(BIO_s_mem()) i2d_OCSP_RESPONSE_bio(bio, (OCSP_RESPONSE*)response1) response2 = OCSP_RESPONSE_new()) d2i_OCSP_RESPONSE_bio(bio, (OCSP_RESPONSE**)response2) Is there a better solution

certificate subject DN

2006-06-05 Thread Saurabh Arora
hi all i am generating a self-signed certificate. is there a way to keep subject distinguished name EMPTY ?? best tanish __ OpenSSL Project http://www.openssl.org User Support Mailing List

Patrick Hsu/DTIS/SFGOV is out of the office.

2006-06-05 Thread Patrick Hsu
I will be out of the office starting Fri 06/02/2006 and will not return until Wed 06/07/2006. I will respond to your message when I return. __ OpenSSL Project http://www.openssl.org User Support

OpenSSL command line error: unable to load client certificate private key file

2006-06-05 Thread Jeremiah Foster
Hello, I am building an OpenSSL application to process credit cards. I am testing the server implementation with the OpenSSL command line tool like this; $ openssl s_client -connect secure.incab.se/verify/server/click:443 -cert trusted.cer The error I receive is; unable to load client

Re: OpenSSL command line error: unable to load client certificate private key file

2006-06-05 Thread Marek Marcola
Hello, I am building an OpenSSL application to process credit cards. I am testing the server implementation with the OpenSSL command line tool like this; $ openssl s_client -connect secure.incab.se/verify/server/click:443 -cert trusted.cer The error I receive is; unable to load client

Re: OpenSSL command line error: unable to load client certificate private key file

2006-06-05 Thread Dr. Stephen Henson
On Mon, Jun 05, 2006, Jeremiah Foster wrote: Hello, I am building an OpenSSL application to process credit cards. I am testing the server implementation with the OpenSSL command line tool like this; $ openssl s_client -connect secure.incab.se/verify/server/click:443 -cert trusted.cer

Re: OpenSSL command line error: unable to load client certificate private key file

2006-06-05 Thread Torsha Banerjee
Is u r private key in a separate .pem file if it is not, first ensure that... Jeremiah Foster wrote: Hello, I am building an OpenSSL application to process credit cards. I am testing the server implementation with the OpenSSL command line tool like this; $ openssl s_client -connect

How to get nonce from OCSP response ?

2006-06-05 Thread Stefan Vatev
What I want is only the nonce, not the whole ASN1 structure. I don't know which is the best way to parse it. First, I get the X509_EXTENSION from the OCSP_RESPONSE bs = OCSP_response_get1_basic(response) resp_idx = OCSP_BASICRESP_get_ext_by_NID(bs, NID_id_pkix_OCSP_Nonce, -1) resp_ext =

Re: How to get nonce from OCSP response ?

2006-06-05 Thread Dr. Stephen Henson
On Mon, Jun 05, 2006, Stefan Vatev wrote: What I want is only the nonce, not the whole ASN1 structure. I don't know which is the best way to parse it. First, I get the X509_EXTENSION from the OCSP_RESPONSE bs = OCSP_response_get1_basic(response) resp_idx =

The *right* way to get -g in compiler options

2006-06-05 Thread Diffenderfer, Randy
Title: The *right* way to get -g in compiler options Folks, This should be easy! What is the *right* way to include the -g option in CFLAG when building openssl-0.9.8b? I have several undoubtedly *wrong* ways I can choose, but I'd rather take the high road here Thanks, rnd

FW: The *right* way to get -g in compiler options

2006-06-05 Thread Diffenderfer, Randy
Title: FW: The *right* way to get -g in compiler options It would appear that the *right* way is to simply stick the '-g' option in the config argument list, ./config -g I thought it would be easy :-) rnd -Original Message- From: Diffenderfer, Randy Sent: Monday, June

having same pub for multiple apps

2006-06-05 Thread Sudharsan Rangarajan
Hi all, I am just wondering if i could have multiple applications on a end host share the same public key. Can this cause a pbm in the sense there are more applications to target and a stupid one can reveal the private key? Or can there be other attacks posssible Thanks, Sudharsan