Peer certificate verification

2001-08-25 Thread Steven E. Czerwinski
Hello - I'm trying to use the Net::SSL perl module to do a simple https request to PayPal.com. Everything seems to work fine, except I get the following message embedded in the response: Client-SSL-Warning: Peer certificate not verified Now, from how it looks, it is trying to tell me that th

Re: The same old self-signed CA problem!

2001-08-25 Thread Dr S N Henson
George Walsh wrote: > > This has been one long battle, made messy later on by my having to work backward >from 0.6.6b to 0.9.6 in order to get a compile under UnixWare7.1.1 > > I have followed the advice Alex Pircher has kindly provided. Basically, that meant >following through the creation

Re: decrypt the encrypted private key

2001-08-25 Thread Dr S N Henson
Yu Tang wrote: > > Dear All, > > I use openssl-0.9.6b. I want to encrypt the private key before > outputing it, so I add the following item in my config file: > > [req] > > encrypt_key=yes > > Then I type the "req" command to generate the key and request file. > > openssl req -newkey rsa:1

Re: [Crypt::SSLeay] Using https proxy

2001-08-25 Thread Joshua Chamas
Bob Niederman wrote: > > etcetera., where $srvr is 'http://servername.domain/file' or > 'https://servername.domain/file' > > Same general code works fileto the same boxes without proxy (different > route not requiring proxy). > > Works fine for http, ethereal shows nothing leaving the box for h

PKCS12 - PEM

2001-08-25 Thread Geert Van Muylem
Hi, Is there a tool to convert pkcs12 (private)keyfile into a PEM keyfile? Thanks, __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automat

Re: session reuse in client side

2001-08-25 Thread Lutz Jaenicke
On Fri, Aug 24, 2001 at 01:31:07PM -0700, Zhong Chen wrote: > I need to reuse the session in ssl client side, I plan to do following: > 1. store a database of destinataion host name versus session id (use > LHASH) > 2. retrieve the session id when user make a new connection based on host > name, t

decrypt the encrypted private key

2001-08-25 Thread Yu Tang
Dear All, I use openssl-0.9.6b. I want to encrypt the private key before outputing it, so I add the following item in my config file: [req] encrypt_key=yes Then I type the "req" command to generate the key and request file. openssl req -newkey rsa:1024 -keyout key.pem -out req.pem -config openssl.

Re: Substitute requests [Was: Practical CA problem - modified requests]

2001-08-25 Thread Andrew Cooke
Damn! Thanks! I was looking at openssl req (because openssl x509 or something similar does print a fingerprint). With that, I can fix things... Thanks again, Andrew At 08:50 AM 8/25/01 +0200, you wrote: >On Sat, Aug 25, 2001 at 07:41:08AM +0100, Andrew Cooke wrote: > > How does she create t