I'm attempting to negotiate a tls session between a client and a server,
and am getting a strange error.
SSL_accept: error:::lib(0) :func(0) :reason(0)
The server code snippet is as follows:
p->tls = SSL_new(p->ctx);
if (SSL_set_fd(p->tls, fileno(stdin)) <= 0)
{
Gideon Serfontein wrote:
>
> I am having a problem signing a Microsoft IE certificate ,
> [..]
> If anyone can help me , or has gotten the Xenroll.dll to work , please
> let me know.
I can send you a gzipped tar-ball with a snapshot of pyCA
(http://sites.inka.de/ms/python/pyca/) which does inclu
My guess the server name should be the CN on the cert.
CN=webserver.whatever.com
Mark S.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Olga Antropova
Sent: Monday, October 04, 199
Try
http://www.w3j.com/7/s3.hirsch.wrap.html
-Mike
[EMAIL PROTECTED] wrote:
>
> Can someone point this newbie to a more complete reference
> document on openssl (the command line utility)? I've looked
> at http://www.openssl.org/docs/openssl.html, but still I am
> mired in ignorance.
> ___
Olga Antropova wrote:
>
> Hi,
>
> When I create the certificate requets there is no field to put the name of the
> server.
>
Currently you should put the server host name in the commonName (CN)
field.
Steve.
--
Dr Stephen N. Henson. http://www.drh-consultancy.demon.co.uk/
Personal Email: [
drh> I know whats confusing you here: the PKCS#12 stuff is all documented :-)
Nope, was even worse: I was lazy. I tried to avoid programming
altogether, and wanted to do it using some openssl command.
(and I was tired...)
Thanks for the outline... :-)
--
Richard Levitte \ Spannvägen 38, II
Can someone point this newbie to a more complete reference
document on openssl (the command line utility)? I've looked
at http://www.openssl.org/docs/openssl.html, but still I am
mired in ignorance.
__
OpenSSL Project
I use:
openssl pkcs12 -export -in file.pem -inkey file.key -name
"CERTIFICATE" -certfile ca.cert \
-out file.p12
file.pem: is the PEM certificate
file.key: certificate private key
ca.cert: CA´s certificate
This worked fine for with Netscape 4.6 AND Internet Explorer 5 (haven´t
tr
Hi,
I have problem with Netscape giving me a warning that the certificate that is
presented by a server (Netscape Enterprise) doesn't have the
server's name in it.
I do not understand where the server name should go. When I create a key pair
I am giving exactly the name of server (rather the na
Richard Levitte - VMS Whacker wrote:
>
> It's possible that this question has already been answered, but...
>
> I need to get my certificate (PEM format) into my Navigator's cert
> database. The only suitable format according to Navigator (4.61,
> BTW...) is PKCS12 (.p12 files).
>
> Now, to co
It's possible that this question has already been answered, but...
I need to get my certificate (PEM format) into my Navigator's cert
database. The only suitable format according to Navigator (4.61,
BTW...) is PKCS12 (.p12 files).
Now, to convert from one to the other has gone beyond me. Perha
As for Telnet over SSL, which are you implementing:
. Tim Hudson's hack (AUTH SSL)
. The IETF's START_TLS
?
Tim Hudson's hack does not prevent man in the middle attacks and
requires that user's submit their passwords to the server (which may
or may not have been compromised.) The START_TLS pr
Some of you have been asking about my package which implements various
protocols over TLS. Here is an alpha release. I have called the
package SafeGossip, or Gossip for short.
Currently the protocols implemented are FTP, telnet (sort of), IMAP,
SMTP and POP. Gossip supports both the old and ne
Hello,
I created my own CA, made my private cert, signed and downloaded it
back to Netscape 4.5 Communicator.
When I'm request the certificate from client, it give me this
error :
-
1.)
[root@mserver]# ca -config /var/ssl/etc/ssleay.cnf
-spkac /home/mserver/pub
14 matches
Mail list logo