Dynamically Adding a New PubKey Method - how to link OID <-> pkey_id ?

2022-08-30 Thread Dr. Pala
had to implement the interface...). Thank you for your help and have a wonderful day! Cheers, Max -- Best Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo

CMS and GCM

2019-05-12 Thread Dr. Pala
) ? Is there a way to list the ciphers supported when using EnvelopedData ? Cheers, Max -- Best Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo

How to Sign and Encrypt in CMS ?

2019-05-05 Thread Dr. Pala
the encryption algorithm from the EnvelopedData/EncryptedContentInfo (I can not find the helper function...) ? Cheers, Max -- Best Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo

[openssl-users] How to Implement a new PubKey method correctly

2018-08-22 Thread Dr. Pala
for any help for understanding all these details... :D Cheers, Max -- Best Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo smime.p7s Description: S/MIME Cryptographic Signature -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl

[openssl-users] d2i_PUBKEY() and X509_get0_pubkey_bitstr() output differences

2018-05-26 Thread Dr. Pala
the same values that does not depend on the type or size of the keys ? Is the 24 Bytes a constant size or ... ? Is there any documentation that would help me... ? Cheers, Max -- Best Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo -- openssl-users mailing list To unsubscribe

Re: [openssl-users] Hashing public keys

2018-03-21 Thread Dr. Pala
Hi Jan, not sure if this might help you, I solved the problem by using X509_PUBKEY + i2d_X509_PUBKEY. Here's an example:     https://github.com/openca/libpki/blob/b87b647170cb5f71e00baffe609f5a02edfa3845/src/openssl/pki_keypair.c#L307 I hope that helps, Cheers, Max On 3/21/18 1:42 PM, Jan

Re: [openssl-users] Certificate Verify and non-root Trust Anchors

2017-12-11 Thread Dr. Pala
Hi Victor, A... that is why :D I wrongly assumed that the newly created parameters would hold the same initialization. This approach works! Thanks again! Cheers, Max On 12/11/17 5:45 PM, Viktor Dukhovni wrote: On Dec 11, 2017, at 7:35 PM, Dr. Pala <madw...@openca.org>

Re: [openssl-users] Certificate Verify and non-root Trust Anchors

2017-12-11 Thread Dr. Pala
Hi Victor, does it matter that we are not in the TLS case (maybe the code is different in the SSL_CTX ) ? I am just trying to validate the chain with the TA set to the SubCA... :D IMHO, the correct (or, better, the expected) behavior (from a developer's standpoint) would be to trust keys in

Re: [openssl-users] Certificate Verify and non-root Trust Anchors

2017-12-11 Thread Dr. Pala
Hi Victor, On 12/11/17 4:18 PM, Viktor Dukhovni wrote: [...] Perhaps you ended up creating a parameter structure with a depth limit that's too small.  Just configuring partial chains will never yield a chain that is longer than it otherwise would be.  In fact you generally get shorter chains. 

Re: [openssl-users] Certificate Verify and non-root Trust Anchors

2017-12-11 Thread Dr. Pala
code yet... ... any suggestion on how to fix this ? Do you think it is actually a bug ? ... or am I missing some other configs / setting I should have done for the verify param ? Cheers, Max On 12/11/17 3:18 PM, Viktor Dukhovni wrote: On Dec 11, 2017, at 5:06 PM, Dr. Pala <di

[openssl-users] Certificate Verify and non-root Trust Anchors

2017-12-11 Thread Dr. Pala
rusted stack or not... Maybe there are flags / trust settings that can be used instead ? Cheers, Max -- Best Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo smime.p7s Description: S/MIME Cryptographic Signature -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

[openssl-users] Windows OpenSSL's FIPS Binaries

2017-12-07 Thread Dr. Pala
Hi all, does anybody know if there are downloadable binaries of openssl-fips and/or openssl-fips-ecp (2.0.16 or earlier) for Windows ? Cheers, Max -- Best Regards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo smime.p7s Description: S/MIME Cryptographic Signature -- openssl

Re: [openssl-users] ASN1 & Recursive Structures definition

2017-12-03 Thread Dr. Pala
the envisioned approach (maybe introducing an intermediate data structure of some kind..?) or use the ASN1_ANY approach. Cheers, Max On 12/2/17 4:54 AM, Richard Levitte wrote: In message <d1eeba62-f25f-c984-dc77-94a150cf7...@openca.org> on Fri, 1 Dec 2017 20:22:09 -0700, "Dr.

Re: [openssl-users] ASN1 & Recursive Structures definition

2017-12-01 Thread Dr. Pala
:14:54 -0700, "Dr. Pala" <direc...@openca.org> said: director> I am trying to define an ASN1 structure similar to this: director> director> ASN1_SEQUENCE(TEST) = { director> ASN1_SIMPLE(TEST, version, ASN1_INTEGER), director> ASN1_EXP_SEQUENCE_OF_OP

[openssl-users] ASN1 & Recursive Structures definition

2017-12-01 Thread Dr. Pala
egards, Massimiliano Pala, Ph.D. OpenCA Labs Director OpenCA Logo -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] Block Ciphers in XTS mode (AES-XTS) [SOLVED - almost ?]

2016-04-06 Thread Dr. Pala
plaintext before encrypting it (e.g., XOR with the block number ?). Thanks, Max P.S.: I am cross-posting the message also to dev as this might have better chances to get an answer there... ? On 4/6/16 10:54 AM, Dr. Pala wrote: Hi all, I am trying to solve a particular problem related t

[openssl-users] Block Ciphers in XTS mode (AES-XTS)

2016-04-06 Thread Dr. Pala
Pala, PhD Director at OpenCA Labs twitter: @openca -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

[openssl-users] Fwd: [saag] Standard Crypto API + Symmetric Crypto At Rest

2015-11-11 Thread Massimiliano Pala
effort. Any comments and feedback are welcome (positive and negative alike). Cheers, Max Forwarded Message Subject:[saag] Standard Crypto API + Symmetric Crypto At Rest Date: Sat, 7 Nov 2015 22:30:35 +0900 From: Massimiliano Pala <direc...@openca.org> Organi

[openssl-users] SOLVED --- ASN.1: Parsing a 'context-specific' class (or app/private class)

2015-09-02 Thread Massimiliano Pala
r solution will be indexed and pop right up on search engines in the future. Thanks! Sent from my mobile On Aug 31, 2015, at 7:10 PM, Massimiliano Pala <direc...@openca.org> wrote: Hi all, I actually figured it out, if anybody is curious about the solution for parsing this CRYPTLIB signature envelo

Re: [openssl-users] ASN.1: Parsing a 'private' class

2015-08-31 Thread Massimiliano Pala
Hi all, I actually figured it out, if anybody is curious about the solution for parsing this CRYPTLIB signature envelope (in this case DSA) - write to me directly, I will be happy to share the solution. Cheers, Max On 8/29/15 6:56 PM, Massimiliano Pala wrote: Hi all, I am trying to parse

[openssl-users] ASN.1: Parsing a 'private' class

2015-08-29 Thread Massimiliano Pala
Hi all, I am trying to parse a sequence that has, after an integer, a 'private' (xclass) item. I was wondering what is the right templates / macros to be able to generate the ASN1 functions with the usual macro. An example of the structure I have to parse (B64 - DER), is the following:

[openssl-users] Fast DH parameters generation

2015-06-16 Thread Massimiliano Pala
Hi all, I am working on an application that would use DH to allow exchanging symmetric keys (not a TLS app), and we noticed that we could use two different approaches to generate the parameters. The first option is to use the DH_generate_parameters_ex() + DH_generate_key() - but that takes

OpenSSL on Win = Thread Safety

2010-06-24 Thread Massimiliano Pala
instead of pthread ones?) -- Best Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] ope...@acm.org project.mana

Re: SSL and Certificates verification

2010-06-20 Thread Massimiliano Pala
(). What I would expect is that, in the second case, I would get notified that the certificate is not trusted... Cheers, Max On 06/18/2010 05:04 PM, Peter Sylvester wrote: On 06/18/2010 01:57 AM, Massimiliano Pala wrote: Hi all, I have two issues when I am trying to verify the certificates from

SSL and Certificates verification

2010-06-18 Thread Massimiliano Pala
, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] ope...@acm.org project.mana...@openca.org Dartmouth Computer Science Dept

SSL and Certificates verification

2010-06-18 Thread Massimiliano Pala
Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] ope...@acm.org project.mana...@openca.org Dartmouth Computer Science Dept

SSL and Certificates verification

2010-06-17 Thread Massimiliano Pala
, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] ope...@acm.org project.mana...@openca.org Dartmouth Computer Science Dept Home

SSL and Certificates verification

2010-06-17 Thread Massimiliano Pala
Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] ope...@acm.org project.mana...@openca.org Dartmouth Computer Science Dept

SSL and Certificates verification

2010-06-17 Thread Massimiliano Pala
() ??? -- Best Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] ope...@acm.org project.mana...@openca.org Dartmouth Computer Science

Re: CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-22 Thread Massimiliano Pala
Hi Sander, I definitely did - now I do initialize all the static locks in OpenSSL *and* the dynamic functions. But they are never called by the chil - the assert fails and the SIGABRT is sent to my daemon forcing it to exit. For some reason it seems the dynamic locking functions do not function

Re: CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-22 Thread Massimiliano Pala
.. :D I just installed the patched version - but no changes in the behavior.. I will try to inspect the `disable_mutex_callbacks`.. but if that is the case, how shall I fix it ??? Later, Max -- Best Regards, Massimiliano Pala --o

FIXED - CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-22 Thread Massimiliano Pala
file with the code for OpenSSL and pthreads, both static and dynamic locks.. Shall we include it into OpenSSL ? void OpenSSL_pthread_init( void ); .. that would make it more usable for the average developer! :D Later, Max Sander Temme wrote: On Nov 21, 2008, at 8:50 AM, Max Pala

Re: FIXED - CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-22 Thread Massimiliano Pala
, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] [EMAIL PROTECTED] [EMAIL PROTECTED] Dartmouth Computer Science Dept Home Phone: +1 (603) 369

Re: CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-21 Thread Massimiliano Pala
] -- Best Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] [EMAIL PROTECTED] [EMAIL PROTECTED] Dartmouth Computer Science Dept

Re: CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-21 Thread Massimiliano Pala
-users@openssl.org Automated List Manager [EMAIL PROTECTED] -- Best Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] [EMAIL PROTECTED

Re: CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-21 Thread Max Pala
Hello Przemek, thanks for the advice - I already tried to use a mutex to protect the OCSP_basic_sign(), but I wanted to avoid it as this will just use only one thread at a time. It seems that nCipher is best used with a simple fork() daemon... if it wasn't for the shared memories, still today

Re: CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-21 Thread Max Pala
Hi Sander, I definitely did - now I do initialize all the static locks in OpenSSL *and* the dynamic functions. But they are never called by the chil - the assert fails and the SIGABRT is sent to my daemon forcing it to exit. For some reason it seems the dynamic locking functions do not function

Re: CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-21 Thread Max Pala
:33 Massimiliano Pala wrote: Hi David, that is really nice.. although.. after I gave it a try... it does not really work :( Actually, it seems that the dynamic functions are never called... :( Investigating... The attached example seems to work. I put it in the top-level directory of the (built

Re: CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-21 Thread Max Pala
Sander Temme wrote: /opt/nfast/toolkits/openssl/openssl098e-patch.txt I found a 'openssl098-patch.txt' is that ok ? Should apply cleanly to newer versions of OpenSSL, with patch -p1. It creates a static lock for CHIL to use so it doesn't need the dynamic ones available. It did. I

FIXED - CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-21 Thread Max Pala
file with the code for OpenSSL and pthreads, both static and dynamic locks.. Shall we include it into OpenSSL ? void OpenSSL_pthread_init( void ); .. that would make it more usable for the average developer! :D Later, Max Sander Temme wrote: On Nov 21, 2008, at 8:50 AM, Max Pala

Re: Engine Issue: nShield 500

2008-11-20 Thread Max Pala
0x08085558 in ?? () #31 0x0010 in ?? () #32 0x in ?? () Any Idea ??? Later, Max Sander Temme wrote: On Nov 19, 2008, at 11:24 PM, Max Pala wrote: The software that I am writing is a multi-threaded OCSP responder. Please make sure you initialize the engine correctly, and set up

CRYPTO_set_dynlock_* mystery ... (was: Engine Issue: nShield 500)

2008-11-20 Thread Max Pala
to do that by using pthreads ? Ciao, Max Sander Temme wrote: On Nov 19, 2008, at 11:24 PM, Max Pala wrote: The software that I am writing is a multi-threaded OCSP responder. Please make sure you initialize the engine correctly, and set up your locking callbacks before you actually

Engine Issue: nShield 500

2008-11-19 Thread Max Pala
[remember].inuse 0' failed. Anybody has experienced problems with this HSM on Linux + pThread ? Cheers, Max -- Best Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] [EMAIL PROTECTED

Re: Engine Issue: nShield 500

2008-11-19 Thread Max Pala
Hello Sande, The software that I am writing is a multi-threaded OCSP responder. Sander Temme wrote: What software are you running that makes he calls into OpenSSL? -- Best Regards, Massimiliano Pala --o

Re: OCSP Resources

2008-06-03 Thread pala
No docs, but there is working code here: https://www.openca.org/projects/ocspd/ Best, Max Quoting Brian Smith [EMAIL PROTECTED]: Does anyone know of any substantial documentation/coding examples that may be available (similar to the Networking with OpenSSL book) for using OpenSSL as an

Re: certificate withou private key

2007-09-30 Thread Massimiliano Pala
in a smartcard) but with the public key only? -- Best Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager][EMAIL PROTECTED] [EMAIL

Re: ASN1_item_sign() / ASN1_item_verify()

2007-09-27 Thread Massimiliano Pala
Hello, thanks :) That was the problem.. I was initializing the library on the server but not on the client. Thanks again! Later, Max Marek Marcola wrote: Do you have OpenSSL library initialized ? Look at man page for SSL_library_init. smime.p7s Description: S/MIME Cryptographic

ASN1_item_sign() - Signing and i2d_ problem :(

2007-09-26 Thread Massimiliano Pala
) at prqp_bio.c:92 = Anyone can help me ? It is quite strange behavior -- I am missing something, but I have no idea *what* am I missing Later, Max -- Best Regards, Massimiliano Pala --o Massimiliano

Re: ASN1_item_sign() - Signing and i2d_ problem :(

2007-09-26 Thread Massimiliano Pala
8otOQZ1gzPDDK53cIbF609hFMoaWmq2e36rIGUHWOl126xu0iKKe8H7HcsqZARf/ NJP9RLofeibFp7gOhO7YjgD6z5ioAjAA -END PRQP RESPONSE- MMm... another error in the ASN1 definition ? Any idea ? Later, Max -- Best Regards, Massimiliano Pala --o

Re: ASN1_item_sign() / ASN1_item_verify()

2007-09-26 Thread Massimiliano Pala
the X509_signature_print() I get no errors on both the server and the client... -- Best Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager][EMAIL PROTECTED

Re: experiences with CRL's Ldap

2005-01-31 Thread Massimiliano Pala
for serving up CRL's of this size and bigger? Is there anyone doing this succesfully? There is no problem with CRLs that size, indeed we successfully use OpenLDAP with CRLs which are 50MB+ in size... -- Best Regards, Massimiliano Pala --o

Re: LIBEAY32.dll

2004-12-27 Thread Massimiliano Pala
folder. -- Best Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] [EMAIL PROTECTED] Tel.: +39 (0)11 564 7081 http://security.polito.it

Re: serializing certificates

2004-11-24 Thread Massimiliano Pala
is always 0. Any thoughts? If this is the case, use the '-set_serial' option. -- Best Regards, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] [EMAIL PROTECTED

HSM - Engine

2004-05-28 Thread Massimiliano Pala
more info ? Thank you, bye. -- C'you, Massimiliano Pala --o Massimiliano Pala [OpenCA Project Manager] [EMAIL PROTECTED] Tel.: +39 (0)59 270 094 http

Re: Creating certificates with more than one eMail address

2004-02-11 Thread Massimiliano Pala
recently with all major email clients available gave completely different results. Multiple emailAddress entries were not supported while multiple email within subjectAltName usage was supported (not by M$ client). -- C'you, Massimiliano Pala --o

Re: Creating certificates with more than one eMail address

2004-02-04 Thread Massimiliano Pala
in the subjectAltName extension. Multiple emailAddress, anyway, within the DN should be avoided as this format is against the standard and does not add any value over the subjAltName extension usage :-D -- C'you, Massimiliano Pala --o

Re: VPN help

2003-12-14 Thread Massimiliano Pala
/ -- C'you, Massimiliano Pala --o- Dr. Massimiliano Pala [OpenCA Project Manager][EMAIL PROTECTED] Tel.: +39 (0)59 270 094 http://www.openca.org

Re: Converting PEM cert to DER format

2003-09-19 Thread Massimiliano Pala
pieces for its verification. Usually there is no preferred format because once loaded you actually use its internal rappresentation of the certificate ... my suggestion: if you have DER just use it and forget the PKCS7 - you don't need it to simply manage a certificate. -- C'you, Massimiliano Pala

Re: interoperability

2001-10-29 Thread Massimiliano Pala
. The easiest way, and most supported by current clients, is to establish a Root CA issuing certificates for sub CAs (hierarchy). It will be possible to recognize and validate sig/certs from the whole chain as the same root is trusted. -- C'you, Massimiliano Pala --o

Re: Practical CA problem - modified requests

2001-08-24 Thread Massimiliano Pala
but you can sign the request, in this case, for later verification. -- C'you, Massimiliano Pala --o- Massimiliano Pala [OpenCA Project Manager] [EMAIL PROTECTED

Re: Request for a -noverify option for openssl ca

2001-04-16 Thread Massimiliano Pala
within the request. This is also logical because if you alter the request then it is no more valid to verification and you cannot state the authenticity of the request. -- C'you, Massimiliano Pala --o- Massimiliano

Re: .CRT

2000-11-27 Thread Massimiliano Pala
it is usually a .pem formatted file (certificate). C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Public key generation

2000-11-27 Thread Massimiliano Pala
Deepak Taneja wrote: Hello , Anybody can tell me that which algo is used to generate client public and private key.? Usually RSA with md5, anyway you can try the DSA as well. C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Expired Certificate in CRL

2000-11-13 Thread Massimiliano Pala
file changing the 'R' into 'E' - setting it to expired instead of revoked. C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Certificate renewal

2000-06-27 Thread Massimiliano Pala
correctly import it and recognize it is the same certificate (try to display it and you'll get an idea of what I am saying). C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Certificate renewal

2000-06-25 Thread Massimiliano Pala
. This almost depends on the crypto layer you are using and policies you are following. If you simply renew the same key-pair just use the old request, but keep in mind that it is a good policy to renew all keys in a 2 years period... C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME

Re: Suspending certificate

2000-06-19 Thread Massimiliano Pala
en I get some spare time, I will re-post some messages to the ietf-pkix working group - hopefully I have enought time to submit an rfc... (??) - who knows ... C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Certificates and authorities.

2000-02-25 Thread Massimiliano Pala
a certificate expiring after 30 days. If you still want to use it, simply renew it... C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Building a Corporate CA

2000-01-27 Thread Massimiliano Pala
routines:SSL3_READ_BYTES:sslv3 alert bad certificate [Hint: Subject CN in certificate not server name or identical to CA!?] Do you use the CA certificate for your server ??? Did you set the CN= field in Subject equal to the server address (i.e. www.yoursite.com). C'you, Massimiliano Pala

Re: Production CA needed

1999-12-23 Thread Massimiliano Pala
I think the discussion should be continued on another mailing list :-D This is really OT, here (sorry people) ... If you can/want to continue discussing it, please subscribe to [EMAIL PROTECTED] C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Seeking officers for Free-software-friendly CA

1999-12-23 Thread Massimiliano Pala
e projects... :-D I know they are rebuilding the hierarchy's root keys... we are waiting to get one CA key to use... :-D C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Seeking officers for Free-software-friendly CA

1999-12-22 Thread Massimiliano Pala
es/CAs/etc... Another way of avoiding the problem is: before applying for a request, the user is asked to import the certificate just before submitting data (required). C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Seeking officers for Free-software-friendly CA

1999-12-22 Thread Massimiliano Pala
.) I think you got the point (not only for free CAs): real problems, by now, are the Policies definitions and organizational realted rather than crypto/software related. C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Seeking officers for Free-software-friendly CA

1999-12-22 Thread Massimiliano Pala
"James B. Huber" wrote: Yes, But I've never been able to do https with it. Please, try now. C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: Certificate Revocation

1999-12-18 Thread Massimiliano Pala
of it is the knowledge of the CA's password, simply ask for it once, then the program will use that in every "challenge" section (see the ca command about the challenge function... ). C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: OpenSSL CA as trusted CA in Netscape browser - help

1999-12-17 Thread Massimiliano Pala
to trust or not the connection: I mean they are not presented with wornings and so on... You should report as a bug to the Netscape people. C'you, Massimiliano Pala ([EMAIL PROTECTED]) __ OpenSSL Project

Re: Certificate Revocation

1999-12-17 Thread Massimiliano Pala
ed CRLs ... I don't know if I got your point, I hope so. C' you, Massimiliano Pala ([EMAIL PROTECTED]) __ OpenSSL Project http://www.openssl.org User Support Mailing List

Re: Certificate Revocation

1999-12-17 Thread Massimiliano Pala
. Anyway I don't think it could be not very wise allowing anyone to mark certificates as revoked. Patchin the code does not require much work, but I don't think it should be done. This is my opinion, what the other OpenSSL people think about this ??? C'you, Massimiliano Pala ([EMAIL

Re: Certificate Revocation

1999-12-15 Thread Massimiliano Pala
be able do revoke certificates. C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

Re: CRL Distribution Mechanism Evaluation and Considerations

1999-12-06 Thread Massimiliano Pala
to most of the available applications. I suggest you to consider some other form of certificate validity such as OCSP, SCVP available on the ietf pages (and mailing lists) (www.ietf.org). C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

OPENCA NEW RELEASE AVAILABLE (v0.2.0)

1999-11-16 Thread Massimiliano Pala
visit our web site where you will find any information on how to send your comments to us. Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

OpenCA Up Again ...

1999-10-16 Thread Massimiliano Pala
, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

NEW DEVELOPMENT RELEASE AVAILABLE SNAP-12-10-1999 (CODE FREEZE)

1999-10-11 Thread Massimiliano Pala
, please visit our web site where you will find any information on how to send your comments to us. Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic

Re: What US companies need to know about RSA

1999-09-28 Thread Massimiliano Pala
s personal and may not be shared. C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME Cryptographic Signature

OCSP patch ...

1999-09-18 Thread Massimiliano Pala
, Massimiliano Pala ([EMAIL PROTECTED]) openssl-SNAP-19990907-ocsp.tar.gz S/MIME Cryptographic Signature

Re: New openssl/apps/spkac

1999-09-02 Thread Massimiliano Pala
? Cout that be the public key itself contained in the SPKAC ? Again, thank you for making it public, it's a great help :) Are you kiddin' ?? First rule of the Net: you give one and get 100 in return! I'm happy if I can share my (poor) knoledge with someone else... C'you, Massimiliano Pala

OpenSSL TryIT (Certs 122.000 )

1999-08-27 Thread Massimiliano Pala
$ ./createindex $index_file_name $number_of_entries Then to check it simple use: $ openssl ca -status $hex_serial_num_of_a_certificate The ca program should work fine. Try it and please report any bug in the patches. Thanks. C'you, Massimiliano Pala ([EMAIL PROTECTED]) #!/usr/bin/perl my

Re: More: Anybody can help?

1999-08-26 Thread Massimiliano Pala
Dr Stephen Henson wrote: The people at OpenCA has developed a patch to ca that enables this behavior, but there is no oficial 0.9.4 patch :-( The patches are available now for the 0.9.4. More info on http://www.openca.org C'you, Massimiliano Pala ([EMAIL PROTECTED]) S/MIME

OpenSSL CA patches (addendum)

1999-06-05 Thread Massimiliano Pala
(because it is necessary only when used) without this patch you should set it or you get an error (either if it is not used). This patch fix this behaviour; Enjoy the patches. C'you, Massimiliano Pala ([EMAIL PROTECTED]) Patches to OpenSSL

Re: Suggestions for the next OpenSSL-Release

1999-05-06 Thread Massimiliano Pala
and Sergio Tabanelli. I have repost this program at the end of march (jfi). If it would be useful i can repost it with the "chkdb"-patches. Sure. As I modified the ca.c file to include a "updated" version of the revoke utility that has been included in the release, i

Re: Certificate site?

1999-05-06 Thread Massimiliano Pala
ape checks it for the CN (Common Name) to be the same as the URL used. For example, if your server's address is: http://www.mydomain.com then you have to issue a certificate with: CN=www.mydomain.com, ..., C=IT It should resolve your problem. See you, Massimiliano Pala ([EMAIL

Re: Form to generate certs

1999-04-14 Thread Massimiliano Pala
__ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED] On www.OpenCA.org when will be available... See you, Massimiliano Pala. S