e
error:ts_rsp_verify.c:291:
which lead me to this
http://openssl.6102.n7.nabble.com/possible-Bug-in-OpenSSL-rfc-3161-TSA-service-tt43128.html#none
Not sure if there has been any work on this since then.
On 29 April 2016 at 11:25, Alex Samad wrote:
> Okay I have the cert from
se this
> information to download the missing certificates, but there
> is no information in this file that would allow a computer
> to do this.
>
> I wonder if changing some parameter in the timestamp request
> would cause the Symantec server to return a more complete
> timest
D5 1D A6 D6 F8
: 6A 22 07 E5 BC 01 C1 E0 j"..
: 10 09 BD 92 09 B5 B7 29...)
: 8B 6A 4D 28 C4 63 7A 4C.jM(.czL
: 8E 7A AF 87 5D BE A4 BD.z..]...
: C1 20 9
Okay thats good. so I am on the right track
thanks
On 19 April 2016 at 14:29, Jakob Bohm wrote:
> On 19/04/2016 05:55, Alex Samad wrote:
>>
>> Hi
>>
>> I have a SHA.sha file
>>
>> /usr/bin/openssl ts -query -data SHA.sha -sha256 | /usr/bin/curl -s -H
>
Hi
I have a SHA.sha file
/usr/bin/openssl ts -query -data SHA.sha -sha256 | /usr/bin/curl -s -H
Content-Type:application/timestamp-query --data-binary @-
http://sha256timestamp.ws.symantec.com/sha256/timestamp > SHA.sha.tsr
/usr/bin/openssl ts -reply -in SHA.sha.tsr -text > SHA.sha.ts.txt
cat
gt; If they are indeed inside the response, then the question
> would be why the "openssl ts -verify" command didn't find
> them automatically.
>
> If they are not inside the response, then the question
> would be why Symantec didn't include them like other
> tsa-s
mantecs site to no available
and I am working on guess work here
On 8 April 2016 at 16:26, Jakob Bohm wrote:
> Try something like
>
> $OPENSSL ts -reply -in ${FL}.tsr -text -noout
>
> (Not sure if it accepts the -noout option or not).
>
>
> On 08/04/2016 08:01, Alex
Okay, how do I dump the intermediaries then ?
On 8 April 2016 at 15:49, Jakob Bohm wrote:
> On 08/04/2016 07:39, Alex Samad wrote:
>>
>> Hi
>>
>> I am trying to use a rfc3161 timestamp service to record timestamps.
>>
>>
>> Basically I have a sha of
Hi
I am trying to use a rfc3161 timestamp service to record timestamps.
Basically I have a sha of some files and I would like to sign the file.
basically I am using something like this
# Generate Query and send
$OPENSSL ts -query -data "$FL" -sha256 | $CURL -s -H
"Content-Type:application/time
Hi
Is this the right mailing list to ask this question ?
Can somebody suggest a better ML
Thanks
From: Alex Samad - Yieldbroker
Sent: Wednesday, 18 March 2015 2:21 PM
To: openssl-users@openssl.org
Subject: RE: [openssl-users] question about resigning a certificate
Hi
I have done that and
Subject: Re: [openssl-users] question about resigning a certificate
On 16/03/2015 02:46, Alex Samad - Yieldbroker wrote:
Hi
I had a sha1 signed CA and I issued other identity and CA certificates from
this CA.
With the deprecation of sha1 coming, I resigned my original CA (self signed) as
Hi
I had a sha1 signed CA and I issued other identity and CA certificates from
this CA.
With the deprecation of sha1 coming, I resigned my original CA (self signed) as
sha512, with the same creation and expiry dates. I believe the only thing
changed was the signature and serial number.
But w
On Sun, Jan 27, 2008 at 01:38:21PM -0800, Montes, Lydia wrote:
> Key created ok, with command:
>
> E:\ptc\apache\bin>openssl genrsa -des3 1024 > servername.key
>
>
>
> Then went to create cert:
>
>
> Microsoft Windows [Version 5.2.3790]
> (C) Copyright 1985-2003 Microsoft Corp.
>
>
>
On Tue, Jan 22, 2008 at 09:34:01PM +1100, Josh Royal wrote:
> I would like to know if it is possible to generate a certificate in which I
> can change the certificate bit eg. Make a certificate which are 40 bits, 128
> bits (which I can do) or 256 bits which is what I would like to. I also know
On Fri, Jan 25, 2008 at 02:03:13PM +0530, Bhatnagar Achindra wrote:
> On Jan 25, 2008 1:48 PM, Jimmy B <[EMAIL PROTECTED]> wrote:
> >
> > On Jan 24, 2008 2:32 PM, Bhatnagar Achindra <[EMAIL PROTECTED]> wrote:
> > > Hi,
> > > Is there any already ported SSL and Crypto library for Linux kernel 2.4
>
15 matches
Mail list logo