Or the x509 command to examine the certificate.
De: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org]
En nombre de Krishna Swarup
Enviado el: miércoles, 21 de abril de 2010 11:11
Para: openssl-users@openssl.org
Asunto: Verifying the certificate in PEM format
Dear User
Forwarded to openssl-users for discussion.
Best regards,
Lutz
- Forwarded message from venki -
Date: Thu, 22 Apr 2010 17:48:40 +0530
From: venki
User-Agent: Thunderbird 2.0.0.24 (Windows/20100228)
To: r...@openssl.org
Subject: error:140773E8:SSL routines:SSL23_GET_SERVER_HELLO:r
Hi Krishna,
Try the verify command, is used to verify x.509 certificates.
Best Regards.
De: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org]
En nombre de Krishna Swarup
Enviado el: miércoles, 21 de abril de 2010 11:11
Para: openssl-users@openssl.org
Asunto: Verif
Hi Andy Polyakov,
you kindly made some comments on my topic.
I understand your comments in the meaning of:
Please do not try to break fopen()/setlocale() compatibility of
BIO_new_file().
This is a good idea, no doubt! But let me go into deep, by quoting your
quotes...
MM>> - For Win32 and Win3
I'm trying to verify a signature.
This signature of a document is a very long hexadecimal string, is stored
alone in the signaturefile.txt
pubfirma.pem is the public key corresponding with the private key used to
sign the document
I used the next commands to verify the signature:
openssl
Hi, I'm from Argentina. I'm doing my Degree Thesis of Computer Science
in my University and I have a problem with OpenSSL and Timestamping.
Is there any way to get de chain of certificates from a tsr file??
With openssl I could get the token, with this command:
openssl ts -reply -in test.tsr
> I actually ended up solving it by removing all uses of BIO_new_fp() in
> favor of my own custom BIO that I just finished writing earlier this
> week.
Why not BIO_new_file?
>>> Yeah, I discovered while analyzing the code that using BIO_new_file()
>>> rather than BIO_new_fp() woul
Hi,
Using `openssl rand' with version 0.9.8g-16ubuntu3.1 I find it ignores
SIGPIPE.
$ strace -s 3 -e write openssl rand 40960 |
> dd bs=1 count=1 of=/dev/null
write(1, "Tgz"..., 4096)= 4096
write(1, "e\214\252"..., 4096) = 4096
write(1, "\202\244\343"
On Thu, Apr 22, 2010, Jan Gillar wrote:
> Hi,
> I have problem with retrieving CRLs with my custom lookup method. With
> 0.9.8h it is working as expected but with 1.0.0 I'm still getting
> X509_V_ERR_UNABLE_TO_GET_CRL. I found that CRL is successfully retrived
> with X509_STORE_get_by_subject c
Hi,
I have problem with retrieving CRLs with my custom lookup method. With
0.9.8h it is working as expected but with 1.0.0 I'm still getting
X509_V_ERR_UNABLE_TO_GET_CRL. I found that CRL is successfully retrived
with X509_STORE_get_by_subject called from X509_STORE_get1_crls (file
x509_lu.c,
Hi,
I have problem with retrieving CRLs with my custom lookup method. With
0.9.8h it is working as expected but with 1.0.0 I'm still getting
X509_V_ERR_UNABLE_TO_GET_CRL. I found that CRL is successfully retrived
with X509_STORE_get_by_subject called from X509_STORE_get1_crls (file
x509_lu.c,
11 matches
Mail list logo