Hi all,
For some strange reasons, when I disable prompt in the cnf file, I run into
the error: ASN1_mbstring_copy:string too
long:a_mbstr.c:154:maxsize=2 error.
Digging around on the net showed that my counter code is longer that 2
characters, which is not true. The following is my country name.
Hi,
On Tue, Apr 13, 2010 at 12:13:49AM -0700, Alex Lam wrote:
Hi all,
For some strange reasons, when I disable prompt in the cnf file, I run into
the error: ASN1_mbstring_copy:string too
long:a_mbstr.c:154:maxsize=2 error.
Digging around on the net showed that my counter code is longer
Hello.
Ive been trying to setup client authentication using a PKCS #12
certificate, and Ive been having some trouble. Im trying to determine
whether its because its something unsupported in openSSL, or if its a
problem with the wrapper library Im using (Pythons httplib). Id
appreciate it
Hi,
OPENSSL supports PKCS#12 files. Look at the header pkcs12.h that
contains functions for parsing and exporting private keys and
certificates from a PKCS#12 file (like d2i_PKCS12 and PKCS12_parse).
Concerning the error you are getting, it appears that the phython module
you are using is
I have some fairly basic code that is now segfaulting reliably with 1.0.0.
It has worked for years with all 0.9.8 releases.
1 - Did something change that I should know about? Before I compile
openssl for debug and step through it, is there something I should look
for?
2 - The meta-question:
hi all,
i have another problem. i am currently writing a php script to act as a
client and log in to a https site (not under my control). i originally
started writing the script with php curl, however i came accross a bug in
php curl which prevents me from getting to a certiain page when
On Mon, Apr 12, 2010, Kenneth Goldman wrote:
I have some fairly basic code that is now segfaulting reliably with 1.0.0.
It has worked for years with all 0.9.8 releases.
1 - Did something change that I should know about? Before I compile
openssl for debug and step through it, is there
Mounir,
Thank you so much for your answer.
I did extract the key into a pem file (using command: c:\openssl\bin\openssl
pkcs12 -in cert.pfx -nocerts -out cert_key.pem), and tried to connect using
the key file as output. It got further along in the process - I was
prompted to enter my PEM pass
This command works:
openssl ocsp -issuer issuer.pem -VAfile trusted_dir/ocsp_signer.pem -url
http://ocsp.test.com -cert cert.pem -resp_text
but this fails:
openssl ocsp -issuer issuer.pem -CApath trusted_dir -url http://ocsp.test.com
-cert cert.pem -resp_text
with:
On Tue, Apr 13, 2010, Chris Bare wrote:
This command works:
openssl ocsp -issuer issuer.pem -VAfile trusted_dir/ocsp_signer.pem -url
http://ocsp.test.com -cert cert.pem -resp_text
but this fails:
openssl ocsp -issuer issuer.pem -CApath trusted_dir -url http://ocsp.test.com
-cert
Additional candidate signer certificates need to be included in the
-verify_other option.
If the OCSP signing certificate is self signed then it needs to be explicitly
trusted which is the -VAfile option if you use that it will also be searched
as a signer.
doesn't putting it in the
Hi,
I found and fixed a small bug in crypto\bio\b_sock.c and want to ask
where to post the patch / fix.
please note:
I can not guarantee of production grade quality of my fix, but it works
pretty well with my implementation of an FTP server.
regards,
Maik,
the modem-man
B.T.W.: what is
Your diff is fine as others use that too.
The address to post bug reports, patches and such to is
r...@openssl.org
You'll get a moderated auto-response from that once it has passed the
[spam]filters there, I guess, and it will then end up being forwarded to the
developers mailing list of
Dear all,
I am trying to add the security flavor to an application. To achieve this
objective, I wrote the codes to establish a security tunnel between the server
and the client with VC2008. When I build the whole project, there are tens of
similar errors. All of them are as follows:
On 4/13/2010 4:49 PM, 芦翔 wrote:
Dear all,
I am trying to add the security flavor to an application. To achieve
this objective, I wrote the codes to establish a security tunnel between
the server and the client with VC2008. When I build the whole project,
there are tens of similar errors.
芦翔 wrote:
Dear all,
I am trying to add the security flavor to an application. To achieve
this objective, I wrote the codes to establish a security tunnel
between the server and the client with VC2008. When I build the whole
project, there are tens of similar errors. All of them are as
From: William A. Rowe Jr.
On 4/13/2010 4:49 PM, 芦翔 wrote:
Dear all,
I am trying to add the security flavor to an
application. To achieve
this objective, I wrote the codes to establish a security
tunnel between
the server and the client with VC2008. When I build the
whole
Hi Remi,
I don't know what the inputs of your python module are, but from the
error message I guess that it's expecting the PEM file to contain also
the certificate of the private key and the associated CA chain. For
that, I advice you to replace the option -nocerts in your command line
with
hi,
Thank you for your notes. Yes, my code is composed of both C and C++ code.
For the openssl part, it is programed by C. And the other part is from C++.
Should I only use extern for those C-realated #include, or all the C code
should be embraced in the extern? Thank you so much.
Best
Dear William,
I tried to add extern in C parts. But, the error is still there. I am not
sure if there is another reason for my question. My files is organized as the
following way.
There are four files: main.cpp, a.h, b.h, b.cpp. Among them, b.h and b.cpp
are programed by C. The
Dear William,
I am sorry for the last intercepted email. I tried the way as your
instruction. But the problem is still there. If there is another reason for my
question. I am not sure if the openssl lib is not compiled. Thank you.
Best Regards,
Xiang
Subject: RE: ERROR LINK2019
hi all , I created a certificate dynamicly in this way (python-twisted
)
dn = ssl.DistinguishedName(commonName=test dn)
dn.inspect() # add by myself
keypair = ssl.KeyPair.generate()
req = keypair.certificateRequest(dn)
def verify(dn):
return True
serialno = 1110
isuser=
22 matches
Mail list logo