Maxime Dubois wrote:
>
> This solution was interesting but it seems that I need the private key of
> the user certificate to sign the request
Yes, my fault. Use the old cert request.
You should store them for auditing reasons anyway.
Ciao, Michael.
__
chris luchini wrote:
>
> Hi All,
>I'm trying to write a little utility that will sign and verify a flat
> text file. The RSA_verify function looks like it's close to what I want,
> but
> the text file in question is not any kind of mail digest.
>
> This is for one off use, so I don't want to
On Wed, Jan 31, 2001 at 12:52:07PM -0800, Patrick Li wrote:
> Does OpenSSL run on HP/UX?
Yes,
Lutz
--
Lutz Jaenicke [EMAIL PROTECTED]
BTU Cottbus http://www.aet.TU-Cottbus.DE/personen/jaenicke/
Lehrstuhl Allgemeine Elektrotechnik
Lutz,
Thanks for the response.
I read the post after I posted it too (Around midnight and my pillow was
calling) and could not understand what I had written myself!!
The point is this:
I am writing a client side application which connects to a defined number
of servers to perform a kind of use
Hi,
Does OpenSSL run on HP/UX?
Thanks
Patrick
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager
On Wed, Jan 31, 2001 at 05:20:50PM +0100, Gil Peeters wrote:
> Noz I assumed (most probably incorrectly) that there is session caching
> built into OpenSSL. I notcied that the are SSL_CTX_set_cache_mode() and
> SSL_CTX_set_cache_size() etc, funtions, as well as the ability to do
> caching by yours
> I would recommend operating with the output of BN_bn2bin, and
> where you need to go back the other way, converting back to a BIGNUM using
> BN_bin2bn. The output of BN_bn2bin (and input to BN_bin2bn) is a
byte-array
> (rather than variable-length words) and is always MS byte first. This also
Hi,
Which format are certificates stored on the file?
Are these then parsed from that format and
ASN.1 encoded to be sent over the wire?
Thanks,
mohan
__
Get personalized email addresses from Yahoo! Mail - only $35
a year! http://personal.
Hi,
I am having trouble with verifying the server certificate
that is sent during the SSL handshake.
I looke through verify.c to get an Idea but the lack of
comments and docs on the X509_* stuff aint helping.
So far I have loaded the root CA certificate using
X509_LOOKUP_load_file.
then I t
The documentation (perldoc + web page) for EVP_SealInit state that:
EVP_SealInit() initializes a cipher context for encryption with
cipher using a random secret key and IV supplied in the
parameter.
That is not true, however, as we can see in p_seal.c (82-83):
if (EVP_CIPHER_CTX_i
On Wed, Jan 31, 2001 at 04:42:47PM +0100, Sven Laaks wrote:
> Hi,
> I use this commandline:
> gcc -o test `libwww-config --cflags` ssltest.c `libwww-config
> --libs`
> I tried it also with:
> gcc -static -o test .
> The libwww-library is compiled with ssl-support and the
> libwww-confi
I think now is the time for the list administration to consider not
accepting mails from emails outside of the list.
First it was Novell, now it's this. I think noone minds the openssl email
traffic, since we subscribed for it, but we didn't want to receive every
copy of every useless newsletter/
Hi,
This solution was interesting but it seems that I need the private key of
the user certificate to sign the request (and unfortunately it was created
and stored in the client browser).
openssl x509 -x509toreq -in cert.pem -out req.pem
Getting request Private Key
no request key file specified
I hope this isn't a loop starting here...
[EMAIL PROTECTED] wrote:
>
>
>
>
> ÁÔÐÇÈËÊÂÐÅÏ¢¿ìµÝ£º*2001*Äê*1*ÔÂ*31*ÈÕ
> <#1>Èȵ㹤×÷ <#1> | <#2>ÈËÊÂÐÂÎÅ <#2> | <#3>ÇóÖ°°Ù¿Æ <#3> | <#4>ÈËʰ¸Àý
> <#4>
__
OpenSSL Project
Hi,
I use this commandline:
gcc -o test `libwww-config --cflags` ssltest.c `libwww-config
--libs`
I tried it also with:
gcc -static -o test .
The libwww-library is compiled with ssl-support and the
libwww-config-file is not modified.
The example "wwwssl" in the example-dir works fine,
Title: Untitled Document
ÁÔÐÇÈËÊÂÐÅÏ¢¿ìµÝ£º2001Äê1ÔÂ31ÈÕ
Èȵ㹤×÷
| ÈËÊÂÐÂÎÅ
| ÇóÖ°°Ù¿Æ
| ÈËʰ¸Àý
Èȵ㹤×÷
TOP 5
Title: Untitled Document
ÁÔÐÇÈËÊÂÐÅÏ¢¿ìµÝ£º2001Äê1ÔÂ19ÈÕ
Èȵ㹤×÷
| ÈËÊÂÐÂÎÅ
| ÇóÖ°°Ù¿Æ
| ÈËʰ¸Àý
Èȵ㹤×÷
TOP 5
On Tue, Jan 30, 2001 at 11:48:07PM +0100, [EMAIL PROTECTED] wrote:
> I seem to be haing a proble with Session Cachin.
>
> I am client onnecting to a HTTP Server which I can not see to get
> session caching going for.
>
> I know that the SSL Server has some quirks and is not u to SPEC.
>
> I use
Yes, pretty much. Check out demos/sign/ in openssl. It's a simple app
example that uses EVP_Sign* and EVP_Verify* to work the signing. It
requires .pem files for use -- one X509 cert and one RSA key. Check
the man pages on openssl ("req" command) to see how to generate them
from the command li
first of all i really wanna say good job guys
second i want some help about a topic
when i installed openssl and made my script
or the key and cert
what happened is the following no one could see the https unless you will install the certificate on his pc manualy
i want that
the next day i trei
20 matches
Mail list logo