I am getting the following error message while trying to decrypt a file.
+++
bad decrypt
477:error:06065064:digital envelope routines:EVP_DecryptFinal:bad
decrypt:evp_enc.c:243:
+++
Sorry, the error occurred at line 956 of s3_pkt.c, not s23_lib.c
- Original Message -
From: "Michael Lee" <[EMAIL PROTECTED]>
To: "OpenSSL" <[EMAIL PROTECTED]>
Sent: Tuesday, September 12, 2000 11:59 AM
Subject: SSL3_READ_BYTES:sslv3 alert illegal parameter
I have problem connecting t
I have problem connecting to a web server running Oracle Web Listener 3.0.
This is the error message I got:
SSL3_READ_BYTES:sslv3 alert illegal parameter
(the error occured at line 956 of s23_lib.c)
I was using SSLv23_client_method(). However, connection was successful when
I used SSLv2_cl
Hi,
I'm a newbie.
I am interested in installing mod_ssl.
I have downloaded mod_ssl html manual.
Here's a clip of Chapter 1:
The mod_ssl package consists of the SSL module (part 1 in Figure 1) and a
set of source patches for Apache adding the Extended API (EAPI) (part 2 in
Figure 1) which is
Hi Gary.
Gary Taylor wrote:
> I have some newbie questions that I'm trying to get a handle on.
>
> I understand there are software products sold that offer 0, 40, and 128 bit
> encryption. I also understand than when you talk about keys that the strength
> is measured in bit size. From what I'
I have some newbie questions that I'm trying to get a handle on.
I understand there are software products sold that offer 0, 40, and 128 bit
encryption. I also understand than when you talk about keys that the strength
is measured in bit size. From what I've read a common size is 512bit and
There was no particular reason for using brokengcc. I used it because I
had to for 0.9.5a (hpux-gcc failed to compile).
I used hpux-gcc for 0.9.6-beta1 afterwards, and the failure is gone!
Richard Levitte - VMS Whacker wrote:
>
> From: John Wang <[EMAIL PROTECTED]>
>
> jjw> I am not sure if I
Hello, I have installed ssl on my apache server, detail as follow:
Web Server: apache_1.3.12
SSL: openssl-0.9.5a
apache_1.3.12+ssl_1.41
Server ID: from Verisign
1. Create private key : openssl genrsa -des3 -rand
file1:...:file5 1024 > www.xxx.com.key
2. Create a CSR: openssl req -
From: Theodore Hope <[EMAIL PROTECTED]>
ssl> Sorry if this is sort of off-topic, but can anyone say
ssl> what other products OpenSSL "competes" with out there,
ssl> other than RSA's BSAFE products?
Are there other commercial products than those from RSA? I've never
heard of any, except for hard
Sorry if this is sort of off-topic, but can anyone say
what other products OpenSSL "competes" with out there,
other than RSA's BSAFE products?
Aside from the fact that OpenSSL is free and open-source (just
two minor details ;->), why should anyone use it instead
of BSAFE or other products (which
From: Richard Levitte - VMS Whacker <[EMAIL PROTECTED]>
> Looks like you have to. There's a few lines of assembler in
> rand_win.c that you can't do without at this time. Perhaps we should
> simply turn off readtimer for Borland C?
OK, turning off readtimer did the trick for now but I'll get me
From: "ukoeppe" <[EMAIL PROTECTED]>
ukoeppe> bcc32 -otmp32\randfile.obj -Iinc32 -Itmp32 -DWIN32_LEAN_AND_MEAN -q -w-aus
-w-par -w-inl -c -tWC -tWM -DWINDOWS -DWIN32 -DL_ENDIAN -O2 -ff -fp -c
.\crypto\rand\randfile.c
ukoeppe> .\crypto\rand\randfile.c:
ukoeppe> Warning W8017 c:\Borland\Bcc55\inc
Hi,
> I'd like to know if the browsers IE and Netscape do reuse the
> sessions because otherwise it's pretty useless for me taking that SSL-cache
> into use. Do you happen to know if they do or not?
They do. That's what I meant when I said they cache sessions.
When your application starts
1.
Just tried it with the update from the Openssl CVS web interface . same
thing
U.K.
- Original Message -
From: Richard Levitte - VMS Whacker <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Monday, September 11, 2000 1:42 PM
Subject: Re: Compile errors Win32
> F
From: "ukoeppe" <[EMAIL PROTECTED]>
ukoeppe> No, I don't have assembler installed.
Looks like you have to. There's a few lines of assembler in
rand_win.c that you can't do without at this time. Perhaps we should
simply turn off readtimer for Borland C?
ukoeppe> Now the error looks somewhat di
Thanks - it worked. I hacked libwww to call
SSL_CTX_load_verify_locations.
Regards,
Charles Walker
Vadim Fedukovich wrote:
>
> On Sat, 9 Sep 2000, Charles Walker wrote:
>
> > I have written some client code which uses OpenSSL plus libwww to
> > retrieve files from a server. In the environmen
From: Richard Levitte - VMS Whacker <[EMAIL PROTECTED]>
> Ah, I think I see. Could you try the following change (do you
> understand the format used?)?
>
> diff -u -r1.6 rand_win.c
> --- crypto/rand/rand_win.c 2000/07/21 02:14:15 1.6
> +++ crypto/rand/rand_win.c 2000/09/11 11:41:16
> @@ -236,7 +2
On Mon, Sep 11, 2000 at 02:49:24PM +0300, Wirta, Ville wrote:
> Netscape and IE both cache sessions and the server you are writing
> should as well. I believe most sane browsers would do the same.
> Unless you are writing your own client, you really don't have to worry
> about client-side cachin
Netscape and IE both cache sessions and the server you are writing
should as well. I believe most sane browsers would do the same.
Unless you are writing your own client, you really don't have to worry
about client-side caching.
Let's say your server caches sessions. If the browser doesn't re-u
From: "ukoeppe" <[EMAIL PROTECTED]>
ukoeppe> Warning W8075 .\crypto\rand\rand_win.c 239: Suspicious pointer conversion in
function RAND_poll
Ah, I think I see. Could you try the following change (do you
understand the format used?)?
diff -u -r1.6 rand_win.c
--- crypto/rand/rand_win.c 200
Netscape and IE both cache sessions and the server you are writing
should as well. I believe most sane browsers would do the same.
Unless you are writing your own client, you really don't have to worry
about client-side caching.
Let's say your server caches sessions. If the browser doesn't re-u
Here is the complete error message that was missing in my earlier post. OS
is Windows 98, compiler Borland 5.5
bcc32 -otmp32\rand_win.obj -Iinc32 -Itmp32 -DWIN32_LEAN_AND_MEAN -q -w-a
us -w-par -w-inl -c -tWC -tWM -DWINDOWS -DWIN32 -DL_ENDIAN -O2 -ff -fp -c
.\cry
pto\rand\rand_win.c
.\crypto
On Mon, Sep 11, 2000 at 12:18:04PM +0300, Wirta, Ville wrote:
> I'd also be VERY interested of this session-cache-thing but I've allready
> seen two different (as I understood) ways to accomplish this and I'm
> confused. I wonder if there is a "session-how-to" somewhere or a simple
> example. I'd
There is a note (written by EAY) on sessions (with code fragments) amongst the
original SSLeay documents.
Cheers
Phil
On 11-Sep-00 Wirta, Ville wrote:
> I'd also be VERY interested of this session-cache-thing but I've allready
> seen two different (as I understood) ways to accomplish this and I'm
I'd also be VERY interested of this session-cache-thing but I've allready
seen two different (as I understood) ways to accomplish this and I'm
confused. I wonder if there is a "session-how-to" somewhere or a simple
example. I'd also like to know if it is a must to be able to touch the
client code.
?? wrote:
>
> no default format.
> if you use openssl, pem is default.It is DER encode of you private key, then
>base64 it. with addtion alogorithm information, it became .pem file.
> PKCS is another format to store one' s certificate of private key or crl. Not
>strange, often used by I
From: Richard Levitte - VMS Whacker <[EMAIL PROTECTED]>
levitte> Good morning,
Of course, I forgot to mention our current release plan, which you can
find on http://www.openssl.org/news/state.html
--
Richard Levitte \ Spannvägen 38, II \ [EMAIL PROTECTED]
Chairman@Stacken \ S-168 35 BROMM
Good morning,
In a couple of weeks, we plan to release OpenSSL 0.9.6. Before that,
there will be a couple of betas, starting with the first some time
this afternoon (swedish time).
We would like to ask you to help us test these betas as soon as
possible and on as many platforms as possible (we
no default format.
if you use openssl, pem is default.It is DER encode of you private key, then
base64 it. with addtion alogorithm information, it became .pem file.
PKCS is another format to store one' s certificate of private key or crl. Not
strange, often used by IE, Netscape. It can jus
29 matches
Mail list logo