>Has anyone else out there deployed OpenSSL on VAX/VMS. If so, do you use the
>MAKEVMS.COM command script to build the libraries? Any help or hints would
>be very much appreciated.
I've not had any experience with OpenSSL, but I did successfully get SSLeay
running on VMS both on Alpha and VAX.
I
Heiko Nardmann wrote:
>
> Dr Stephen Henson wrote:
> [...]
> > If there are only a few possible OIDs then this might work if you add
> > appropriate aliases as well to NID_ripemd160WithRSA.
> >
> > Using OIDs like that is evil, what should really be done is to add
> > appropriate structure to the
The book you are thinking of is probably "Handbook of Applied
Cryptography" by Alfred Menezes. There is another just out by Neil
Koblitz, "Algebraic Aspects of Cryptography."
I can't really comment on either book, I haven't read Menezes' and the
version of Koblitz's book I have is pre-beta. In
Oops. I should have take the explicit path out of that! Here it is
again:
eval '(exit $?0)' && eval 'exec perl -S $0 ${1+"$@"}'
& eval 'exec perl -S $0 $argv:q'
if 0;
#!here starts the perl code
Russ Selph - [EMAIL PROTECTED]
Architect, TIBCO Software Inc.
veni vidi gdb
On Fri, 19 Feb
Actually the perl man page recommends the following "devious construct" as
the most portable way to start your perl script:
eval '(exit $?0)' && eval 'exec /usr/bin/perl -S $0 ${1+"$@"}'
& eval 'exec /usr/bin/perl -S $0 $argv:q'
if 0;
#!here starts the perl code
I've used this on Linux, S
I think it could be useful to support the SRP (Secure Remote Password)
method of key exchange.
This protocol seems very solid, allowing two parties to authenticate
themselves and arrive at a common session key essentially without
using any encryption at all. It only relies on modular exponentiat
Dear All,
We're using OpenSSL-0.9.1.c to secure the connection between a legacy server
process running on VAX/VMS V5.5-2 and an all new client process running on
NT 4. As we (half) expected, OpenSSL builds cleanly under NT but does not
fare so well under VMS :-( After a considerable amount of hac
Found it - Web Security and Commerce is a very good intro to
security issues. By Garfinkel and Spafford, pub by O'Reilly.
Andrew
At 02:17 PM 2/19/99 +, you wrote:
>
>This may be the same book... on a similar vein (good intro, but no
>maths) try the Nutshell book with the shark on the fron
Hi!
While working with ssl3_send_server_certificate() and
looking at its source code I wondered whether a possible
error return code of the ssl3_output_cert_chain() call is
checked somewhere.
Here is the piece of code (snapshot 19990218):
1699 int ssl3_send_server_certificate(s)
[...]
1714
Oops ... in my last patch there is still the '11' which
is only there due to the misunderstanding (11h = 17d).
So here are the patched patches.
--
Ciao ... Heiko Nardmann (Dipl.-Ing.)
Software Development, secunet (www.secunet.de)
Security Networks GmbH, Weidenauer Str. 223-225, D-57076 Siegen
T
Dr Stephen Henson wrote:
[...]
> If there are only a few possible OIDs then this might work if you add
> appropriate aliases as well to NID_ripemd160WithRSA.
>
> Using OIDs like that is evil, what should really be done is to add
> appropriate structure to the AlgorithmIdentifier instead.
>
> Tha
This may be the same book... on a similar vein (good intro, but no
maths) try the Nutshell book with the shark on the front. Can't
remember the title or author and it looks like someone has "borrowed"
it
Andrew
At 12:13 PM 2/19/99 +, you wrote:
>On Fri 19 Feb, John wrote:
>> Hi guys,
open ssl is really an open list :-)
(*no hard fealing*)
>
>Noch ein Hinweis in eigener Sache am Rande:
>sollten Sie Interesse an Chipkarten-gestuetzter Verschluesselung,
>Signatur oder Authentisierung haben (auch im Apache Kontext),
>so koennen wir Ihnen auch weiter helfen, da wir im Rahmen eine
Oops up ...
I missed that the 11 is hex and therefore decimal 17 which is ok
according to the TeleTrusT document.
So here is the patch for 19990218 snapshot if someone wants to
integrate those OIDs.
--
Ciao ... Heiko Nardmann (Dipl.-Ing.)
Software Development, secunet (www.secunet.de)
Security
Hallo!
Hubert Froehlich wrote:
>
> Hi there,
>
> I am rather new to Apache-SSL. I want to set up a SSL Web server that, hopefully, can
>
> also manage client authentication
>
> I have set up an Apache-SSL Web Server(1.2.6) with SSLeay 0.9.1b and it works.
>
> I worked through the articles by
On Fri 19 Feb, John wrote:
> Hi guys,
>
> Do you advise any good cryptography book? I got Bruce Schneier
> second edition of Applied Cryptography, but still looking for something
> else.
For a higher level read try 'Internet Cryptography' by Richard E Smith. It is
aimed at managers and other peo
Erwann ABALEA wrote:
>
> On Thu, 18 Feb 1999, Heiko Nardmann wrote:
>
> > In the 19990217 snapshot the Configure script has
> > the path to perl hard coded to /usr/local/bin/perl.
> > Since I have perl located at a different location
> > this does not work. Maybe it the shell given in the
> > fi
John wrote:
>
> At 12:36 PM 2/19/99 +0100, [EMAIL PROTECTED] wrote:
> >>>
> >>> Hi guys,
> >>>
> >>> Do you advise any good cryptography book? I got Bruce Schneier
> >>> second edition of Applied Cryptography, but still looking for something
> >>> else.
> >
> >What's wrong with this book for you?
Heiko Nardmann wrote:
>
> Hi!
>
> I asked about the OID 1.3.36.3.3.1.2.1024.11.
> I now found out that the prefix 1.3.36.3.3.1.2
> describes the TeleTrusT signature algorithm
> rsaSignatureWithripemd160.
> The two following numbers give the maximal keysize (1024)
> in bits and the length of the
Vadim Fedukovich wrote:
>
>
> I'm sorry for not mention your patch, Steve. It really do right thing.
>
> > Specifically if there are any signed attributes (e.g. signing time) the
> > signature produced is invalid and it wont verify a correct signature.
>
> I'd rather say old SSLeay generates S
John wrote:
>
> Hi guys,
>
> Do you advise any good cryptography book? I got Bruce Schneier
> second edition of Applied Cryptography, but still looking for something
> else.
>
Easier one or going deeper?
For deeper documentation I recommend
"Cryptography - Theory and Practice"
Douglas R. Sti
Hi!
I asked about the OID 1.3.36.3.3.1.2.1024.11.
I now found out that the prefix 1.3.36.3.3.1.2
describes the TeleTrusT signature algorithm
rsaSignatureWithripemd160.
The two following numbers give the maximal keysize (1024)
in bits and the length of the exponent in bits (11).
So how can this b
22 matches
Mail list logo