Hi,
I'm using Openssl 0.9.6g on
Linux. After I've revoked a certificate and generated a CRL, I was wonder what
time source did the Openssl get to stamp in the CRL. After I generated the CRL,
I used "asn1parse" to dump theCRL into ASN1 then in theCRL time
section the opensslused my system
Hi,
For me after installing the High encryption patch it work fine. MSIE and also
Netscape (before 4.73) already support CA Certificate with 1024 bits without
installing any patch. You should check it out again.
Regards,
Sorot
Daniel Hirscher wrote:
Hi,
I have installed every available
Hi there,
I think your problem may come from the Key Length of the certificate.
Since Netscape 4.73 can generate the certificate with High Key length
(1024 bit) but MSIE4.x and also 5 and 5.5 don't support High Key Length.
You may have to download the patch from Microsoft to make your IE capable