- Oorspronkelijk bericht -
Van: "Richard Levitte - VMS Whacker" <[EMAIL PROTECTED]>
Did you need to do any changes to OpenSSL?
No, I did not have to change the sources, only some other files.
In util\pl\mingw32.pl I added the option -fnative-struct to CFLAGS, and
changed $rm='rem' to $rm
Hello,
I am using openssl-0.9.6 on a Solaris box. I am
currently using a temporary self signed certificate.
The OS is Solaris 8. For /dev/random I have installed
ANDIrand(http://www.cosy.sbg.ac.at/~andi/) and I have
also installed PRNGD. I installed both as I thought
the problem might relate to th
Hello, I'm using an SSL created with BIO_new_ssl_connect.
I set the connect BIO to non-blocking, and I've also set the
SSL_get_rbio() and SSL_get_wbio() BIO's to non-blocking.
(I don't think I actually need to do that - correct?)
At any rate, everything goes fine, until I call SSL_shutdown whic
From: "GnuWin32" <[EMAIL PROTECTED]>
gnuwin32> An MS-Windows (Win32) port of OpenSSL-0.9.6b is available from
gnuwin32> http://gnuwin32.sourceforge.net/
gnuwin32> It has been compiled with the Mingw implementation of GCC.
Did you need to do any changes to OpenSSL? Would you report them back
to
An MS-Windows (Win32) port of OpenSSL-0.9.6b is available from
http://gnuwin32.sourceforge.net/
It has been compiled with the Mingw implementation of GCC.
Kees Zeelenberg
__
OpenSSL Project http
I'm writing a program that uses openssl to read the
private key from a ASN1.DER encoded file. The openssl
API outputs the following:
17752:error:0D080071::lib(13) :func(128)
:reason(113):a_int.c:191:
17752:error:0D09D082::lib(13) :func(157)
:reason(130):d2i_r_pr.c:124:
I'm using the load_key() f
Thanks a lot for all your help...
The problem was SuSE doesn't provide the standard root certificates in
their rpms. They divide openssl in three packages: openssl (containing
compiled openssl and libraries, c_rehash and a minimum of docs),
openssl-doc (containing manpages for all openssl command
On Fri, Aug 17, 2001 at 07:07:45PM -, ganesh kumar godavari wrote:
> hai lutz,
> thanks for the information, i am still having a problem as the callback function for
>SSL_CTX_SET_remove_cb is not being called.
>
> this is how i am testing, can u tell me where i am wrong??.
>
> on generating
The components are in the 'RSA' structure. They are all BIGNUM
structures which can be manipulated and converted to various forms:
check out the bn and rsa manual pages for more info.
Steve.
--
Dr Stephen N. Henson. http://www.drh-consultancy.demon.co.uk/
Personal Email: [EMAIL PROTECTED]
Se
Jürgen Nagler wrote:
>
> Dr S N Henson wrote:
> >
> > There are a few standard root certificates (which is what you need here)
> > in the 'certs' directory of the OpenSSL distribution. It looks like the
> > one you want is thawteCb.pem . How you add this to your applications
> > trusted store var
Once you locate the certs you need, you have to use
SSL_load_verify_locations.
You could create a PEM file and put into your cert and the issuer cert, so
you can pass this file as argument of the function before...
- Original Message -
From: "Dr S N Henson" <[EMAIL PROTECTED]>
To: <[EMAIL
Hi,
Can somebody tell what the api I can use to extract the private key
component from RSA key is? There is a command :
openssl rsa -inform PEM -in key.pem -text
to display the private key components. However, what I need is a api to use
in my application?
Thanks,
Best regards,
Wall
Dr S N Henson wrote:
>
> There are a few standard root certificates (which is what you need here)
> in the 'certs' directory of the OpenSSL distribution. It looks like the
> one you want is thawteCb.pem . How you add this to your applications
> trusted store varies, typically you'll either place
13 matches
Mail list logo