Which error occured? I suppose you read all the erros from
the error stack and know what exactly happend.
Hemant Jain schrieb:
>
> Hi All,
>
> I read the private key/public key from my store and copied its contents
> to variables n,e,d,etc. in the rsa_oaep_test.c as another key (key4).
> While
Since guessing is very difficult just tell us:
What are these errors?
admin linux schrieb:
>
> hi,
>been trying to make on linux redhat 6.0 openssl unsucessfully. Is
> there a document on howto
> make for this version of linux? I have tried..
> #./Configure linux-elf
> as well as..
> #./Conf
This is a very difficult question. the answer depends on
the role of the CA. If it's done inhouse (eg. for a company)
Then there are good chances to "update" the software with
the help of established organizational procedures (similiarry
like updating the word processor).
If a "public" CA like Th
hi,
been trying to make on linux redhat 6.0 openssl unsucessfully. Is
there a document on howto
make for this version of linux? I have tried..
#./Configure linux-elf
as well as..
#./Configure linux-aout
then doing a..
make
which errors out..
so i can't proceed to 'make test'
or 'make install' c
Perl HTTPS support is a complete mess.
I don't know the prognosis, I dont know if anyone is taking ownership of it.
At one time, you could simply plug the very latest ssleay into
crypt-ssleay.pm and lwp, and the world was good.
That is no longer the case.
Here are some options:
1. Compile the
Hi All,
I read the private key/public key from my store and copied its contents
to variables n,e,d,etc. in the rsa_oaep_test.c as another key (key4).
While the test program works fine for encryption and
decryption for key1, key2 and key3, I get an error while
decrypting with my private key.
C
Help!
This thing is driving me crazy. I have rsaref-2.0, OpenSSL 0.9.3a, and
mod_ssl-2.3.3. I want to setup my mod_ssl as an .so for Apache but I
can't get past the RSAglue problem. Everything about OpenSSL and rsaref
seem to install/compile correctly but I get the following:
% ./configure \
> -
LWP currently doesn't have a protocol handler for HTTPS, only HTTP. You'd
have to roll your own, though there may be a Perl interface for OpenSSL to
make it easier.
Dave Neuer
-Original Message-
From: [EMAIL PROTECTED] <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED] <[EMAIL PROTECTED]>
Date:
What does a CA do when its private key is compromized?
ie. What happens when the root of a key hierarchy cannot be trusted?
At least, all the certs it has signed are suspect. How does it
distribute a new public key?
David Marwood
__
Hi everybody,
I'm developping a multithreaded application that can have 2 parts: a
server one and a client one (to connect to other daemon). All that wrks
with posix threads under linux (glibc 2.0) and OpenSSL 0.9.3a.
I use one global SSL_ctx for all the connections, and I create a SSL *
for e
[EMAIL PROTECTED] wrote:
> URL please?
As usual:
http://mike.daewoo.com.pl/computer/stunnel/
> And, how does it compare to ssl-auth:
> http://web.purplefrog.com/~thoth/netpipes/ssl-auth.html
ssl-auth is a very specific software to provide SSL for shell scripts.
stunnel is intended to provi
A while ago I was investigating writing some perl that would do a
post using HTTPS on NT. I needed the ssl package and one of the perl
pages that would give me the infrastructure I needed. After lots of
compile problems and the help of a bunch of folks on this list I was
able to get past the comp
> Apologies for Nth interation of this Same Old Question, but the FAQ
> solution didn't work for me.
>
> I want to be able to start httpsd without httpsd prompting for a
> password. I followed the directions found in:
> http://www.modssl.org/docs/2.3/ssl_faq.html#remove-passphrase
> to create a
I am having trouble getting an https connection to work through a proxy.
My understanding is that I can just send the CONNECT command to the proxy, then
setup the ssl stuff as usual. But it doesn't work. I don't see any errors, but
I also don't get any https back from the remote site. Any su
Mario,
I have a demo DSA CA. What you must do is:
- create DSA parameters
- create a DSA key-pair
- modify the openssl.cnf for the CA
- create the self-signed CA certificate
- also modify openssl.cnf for the user (nothing DSA-related, I think)
- generate DSA parameters, key, cert-request
- sign
15 matches
Mail list logo