gnoMint 0.5.3 (Default branch)


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements Software Releases - RSS News gnoMint 0.5.3 (Default branch)
# 1  
Old 09-08-2008
gnoMint 0.5.3 (Default branch)

gnoMint is a tool for easily creating and managingcertification authorities. It provides fancyvisualization of all the pieces of informationthat pertain to a CA, such as x509 certificates,CSRs, and CRLs. gnoMint is currently capable ofmanaging a CA that emits certificates that areable to authenticate people or machines in VPNs(IPSec or other protocols), secure HTTPcommunications with SSL/TLS, authenticate andcipher HTTP communications through Web-clientcertificates, and sign or crypt email messages.License: GNU General Public License v3Changes:
There is an initial Czech translation. Now, when exporting certs, the full certification path is exported and saved. There is a new feature for generating PKCS#3 Diffie-Hellman parameters. There are also several fixes. Lists order has been fixed. A problem while generating DSA CSRs has been fixed. There are patches for fixing i18n and autotools misconfigurations.Image

Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
SSL_CTX_add_extra_chain_cert(3SSL)				      OpenSSL					SSL_CTX_add_extra_chain_cert(3SSL)

NAME
SSL_CTX_add_extra_chain_cert - add certificate to chain SYNOPSIS
#include <openssl/ssl.h> long SSL_CTX_add_extra_chain_cert(SSL_CTX ctx, X509 *x509) DESCRIPTION
SSL_CTX_add_extra_chain_cert() adds the certificate x509 to the certificate chain presented together with the certificate. Several certificates can be added one after the other. NOTES
When constructing the certificate chain, the chain will be formed from these certificates explicitly specified. If no chain is specified, the library will try to complete the chain from the available CA certificates in the trusted CA storage, see SSL_CTX_load_verify_locations(3). RETURN VALUES
SSL_CTX_add_extra_chain_cert() returns 1 on success. Check out the error stack to find out the reason for failure otherwise. SEE ALSO
ssl(3), SSL_CTX_use_certificate(3), SSL_CTX_set_client_cert_cb(3), SSL_CTX_load_verify_locations(3) 1.0.0e 2002-02-15 SSL_CTX_add_extra_chain_cert(3SSL)