Hello,
When I was trying to export a certificate from IE, it states a file
extension of p7b. If this is a PKCS7 format certificate, what 's the
difference between p7b and p7c?
What is BER? I just know DER is Distinguished Encode Rules. In Openssl,
I could (in many case) choose bet
> From: Stefan Schmidt <[EMAIL PROTECTED]>
>
> I am looking into using OpenSSL commercially in the US but I can't find
> anything about the legal issues other than that there are some. So I know
> that RSA holds patents on their algorithms in the US until September 2000.
> Can I just not use the
> I found the answer to this once in the list archives, but neglected
> to write it down. I have a key that I need to decrypt so that I can
> run multiple keys on my server without have to type in the PEM
> phrase.
>
> Can someone help me with this?
>
These are the old directions, just replace
Odpowiedz automatyczna:
Do 5 maja przebywam na zasluzonym urlopie.
W pilnych sprawach prosze o kontakt z Kamilem Kilinskim.
Z powazaniem,
Michal Trojnara
>>> "[EMAIL PROTECTED]" 05/01/00 21:51 >>>
Amit Chopra <[EMAIL PROTECTED]>:
> I had reported some leaks some time back, but got no re
I'm fooling around trying to figure out how to use the OpenSSL C API.
I've read the docs and some things are clear some are not.
In the functions BF_cbc_encrypt() what is the ivec variable.
What does it do and what is it for and what is it supposed to do?
Thanx for any help.
Paul
___
Sorry all I figured it out, I had my own memory leak that was screwing me
up.
Apologizes to all for the interruption,
brian
-Original Message-
From: Brian Snyder
Sent: Monday, May 01, 2000 5:37 PM
To: Ssl (E-mail)
Subject: SIGBUS on solaris w/ C++ wrapper class any ideas???
Hi
Hi all,
I am writing a C++ wrapper class as an interface into certain openSSL
commands, and when I call SSL_write, I get a SIGBUS. I traced through with
gdb and where this call takes place, I tried to 'print ssl' I get:
$5 = (SSL*) 0x656e7449,
then I do 'print *ssl' I get:
Cannot access memory at
Amit Chopra <[EMAIL PROTECTED]>:
> I had reported some leaks some time back, but got no response from the
> mailing list.
>
> OpenSSL 0.9.4 leaks 332 bytes for ERR_STATE struct allocated while doing
> SSL_read.
> ERR_get_state [err.c:561]
> => ret=(ERR_STATE *)Malloc(siz
On Mon, May 01, 2000 at 10:16:28PM +0200, Richard Levitte - VMS Whacker wrote:
> From: Tony Nelson <[EMAIL PROTECTED]>
>
> I understand that some corporations choose to do that, although I do
> not agree with that kind of practice.
Basically, companies do it to protect themselves.. for the very
OpenSSL so far is patent free and probably will remain generally so unless
some hotshot chooses to try to patent something which has already been
done - but they don't know about. This has happened - I have examples.
RSA's stuff is patented in the US only and it expires as you say in Sept.
Thus
From: Tony Nelson <[EMAIL PROTECTED]>
tnelson> On Mon, May 01, 2000 at 08:44:17AM -0600, Mike Nigbor wrote:
tnelson> > OK, so how does this differ from a "man-in-the-middle" attack?
tnelson> >
tnelson> > Since there are two SSL sessions, there must be two session
tnelson> > encryption keys and t
I found the answer to this once in the list archives, but neglected to write
it down. I have a key that I need to decrypt so that I can run multiple
keys on my server without have to type in the PEM phrase.
Can someone help me with this?
Thanks.
--
John Banghart (mailto:[EMAIL PROTECTED], 717-
PMFJI...
How does one utilize something like a Cisco PIX firewall in an SSL
environment? On option the firewall seems to offer is translation of
network addresses, so a message that might be routed to vvv.xxx.yyy.zzz (a
web-registered address) could rerouted to a private network address by the
f
Dear readers,
I've just came back to ssl since a long time away with LDAP...
Now, I've just encountered a problem with a DNS CNAME based "multiple
server" configuration.
I know I could generate a cert for cn=*.mydomain.my, and both NS and
latest MS products are supposed to accept that
>Date: Sat, 29 Apr 2000 20:51:01 +0200
>From: [EMAIL PROTECTED] (Bodo Moeller)
>To: Ted Powell <[EMAIL PROTECTED]>
>Ted Powell <[EMAIL PROTECTED]>:
>
>> When I ran openssl-0.9.5a's "make test", the tmp.bntest file that was
>> written contained (out of 1800+ tests) seven expressions which Solaris
On Mon, May 01, 2000 at 08:44:17AM -0600, Mike Nigbor wrote:
> OK, so how does this differ from a "man-in-the-middle" attack?
>
> Since there are two SSL sessions, there must be two session encryption keys
> and the proxy must be decrypting and re-encrypting everything it sees.
>
> If I'm a clie
Hi, I'm doing some retro Y2K certification on our latest product that uses
SSLeay. This product didn't exist last year but we have to insure that
it doesn't have any Y2K problems. I was looking at www.openssl.org and
did not find any certification informat. Do you have a formal Y2K statment?
T
Monday, May 01, 2000, 7:13:49 AM, you wrote:
S> 1. are there any list about openssl in spanish ?
S> 2. can somebody send a example of a openssl.cnf ?
Here it is:
[ req ]
default_bits= 1024
default_keyfile = key.pem
distinguished_name = req_distinguished_name
encrypt_rs
OK, so how does this differ from a "man-in-the-middle" attack?
Since there are two SSL sessions, there must be two session encryption keys
and the proxy must be decrypting and re-encrypting everything it sees.
If I'm a client, shouldn't I reject such a connection?
-Original Message-
Fro
On Sun, Apr 30, 2000 at 08:01:30PM -0700, Jeff Magnusson wrote:
> I'm using Net::SSLeay for a non-blocking server and it sets up new client
> connections fine, but when I write to the client (SSL_write) I get the
> following error:
>
> SSL_write 17655: 1 - error:1409F07F:SSL routines:SSL3_WRITE_
I am looking into using OpenSSL commercially in the US but I can't find
anything about the legal issues other than that there are some. So I know
that RSA holds patents on their algorithms in the US until September 2000.
Can I just not use their algorithms and still use OpenSSL and if so how
would
> -Original Message-
> From: Ted Powell [mailto:"Ted Powell Sent: Friday, April 28, 2000 5:59 PM
> When I ran openssl-0.9.5a's "make test", the tmp.bntest file that was
> written contained (out of 1800+ tests) seven expressions
> which Solaris 7's 'bc' evaluated to give non-zero results
Please remove [EMAIL PROTECTED] from the list.
I've received enough of these alredy...
Thanx!
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED
23 matches
Mail list logo