Re: Problems with Net::SSLeay

1999-08-04 Thread Sampo Kellomaki
"Ferrari, Nelson" <[EMAIL PROTECTED]> writes: > If I run: > perl -MNet::SSLeay -I Library -e 'print > Net::SSLeay::get_https("www.quickcommerce.net", 443, > "/scripts/qc25/merchantlogin.asp")' > > I get: > > SSL_write 9396: 1 - error:1409E0E5:SSL routines:SSL3_WRITE_BYTES:ssl > handshake failur

[Q] Free package that implements Elliptic Curve Cryptography

1999-08-04 Thread Kwon JaeHwan
Sorry to ask the question that is unrelated to openssl. Is there any free and open source that implements ECC (Elliptic Curve Cryptography) ? Of course, it must implement ECDH key exchange, handle ECDSA based certificates, and handle ECDSA signing. Th

Re: ANNOUNCE: Net::SSLeay perl module 1.05

1999-08-04 Thread Michael
> On 3 Aug 1999, Sampo Kellomaki wrote: > > > ... > > Now, could you provide me a snippet showing how I can discover in Perl > > that I am running on Windows platform. That way Makefile.PL will be > > able to automatically adapt. > > ... > > i've been told that the following does the job succesf

The string contains characters that are illegal for the ASN.1 type

1999-08-04 Thread wjun
Hi, I am a beginner in openssl. Now i meet a question: When I input a organizationName in Chinese character, Signing the request happens the following error: Using configuration from /usr/local/ssl/openssl.cnf Using configuration from /usr/local/ssl/openssl.cnf Check that the request matches the

Re: RSA_public_encrypt misuse/limitations/bug?

1999-08-04 Thread Bodo Moeller
Ben Wooller <[EMAIL PROTECTED]>: > I did a fair bit of testing, and found that with a 512 bit key, i can > encrypt messages up to 53 bytes in length, and with a 1024 bit key i can > encypt up to 117 bytes of data. > Is this a result of me not setting something up before i do the > RSA_public_enc

Re: SSL_CTX / forking problem

1999-08-04 Thread Bodo Moeller
Brett Polivka <[EMAIL PROTECTED]>: > I am having a very strange problem which I do not understand at all. > > I am writing a forking server using OpenSSL. If I set up an SSL_CTX in > the parent process and then allow the fork to copy the context into the > process space of the children which it

RSA_public_encrypt misuse/limitations/bug?

1999-08-04 Thread Ben Wooller
I did a fair bit of testing, and found that with a 512 bit key, i can encrypt messages up to 53 bytes in length, and with a 1024 bit key i can encypt up to 117 bytes of data. Is this a result of me not setting something up before i do the RSA_public_encrypt, or incorrectly calling the function? O

Re: BIO pairs

1999-08-04 Thread Bodo Moeller
"Douglas E. Engert" <[EMAIL PROTECTED]>: > Shaheed Bacchus wrote: >> does anyone have any code written using BIO pairs (other than >> ssltest.c) that they would be willing to show? > See www.globus.org The gssapi uses SSL, and writes to a BIO, then > grabs the data written , and calls it a

SSL_CTX / forking problem

1999-08-04 Thread Brett Polivka
I am having a very strange problem which I do not understand at all. I am writing a forking server using OpenSSL. If I set up an SSL_CTX in the parent process and then allow the fork to copy the context into the process space of the children which it spawns, the size of the children will grow as

Re: BIO pairs

1999-08-04 Thread Douglas E. Engert
See www.globus.org The gssapi uses SSL, and writes to a BIO, then grabs the data written , and calls it a GSSAPI token. Shaheed Bacchus wrote: > > Hi everyone, > does anyone have any code written using BIO pairs (other than > ssltest.c) that they would be willing to show? > > __