Hi
I'm looking for an implementation of S/MIME with CMS compression support
(RFC 3274). I understand that OpenSSL implements S/MIME v2.0 and
compression formally is an extension to S/MIME v3.1.
That said, do you consider it technically feasible to try to hack it
into the OpenSSL as it looks
Richard Levitte - VMS Whacker wrote:
Well, with my scheme, the entire chain goes from the leaf to your
point of trust, not further. Checking CRLs between those two points
makes sense, doesn't it? Henrik Nordström outlined the reasons to do
so in message
[EMAIL PROTECTED].
Yes, of course.
there might be such
certificates present in an incoming S/MIME message that we are
verifying).
Thanks in advance for any pointers or help.
Mats Nilsson
__
OpenSSL Project http://www.openssl.org
the
'store' for a proper client certificate before looking through the 'other'
list?
Best Regards,
Mats Nilsson
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
SSL_get_peer_certificate() to get to the
certificate of the peer. Is there a clever way I can get to its parent's
certificate?
The chain that SSL_get_peer_cert_chain() returns, doesn't seem to include
the entire chain, in case the peer's parent is self-signed. Is this correct?
Regards,
Mats
[NT4.0SP6, MSVC6SP3, OpenSSL 0.9.5]
I have an rsa private key in a pem file. It is protected by a password. I'd
like to change password. So I try:
openssl rsa -in key.pem -out key2.pem -des3
I get asked for the old password, but then it aborts with the usual "prng
not seeded" message:
read