"Horowitz, Michael" wrote:
>
> Hello,
>
> When I build OpenSSL with shared libraries the programs that link against
> them don't work.
>
> That all worked without any problems or errors. The config script
> configured for "solaris-sparcv9-gcc".
>
> When building other programs such as wget,
Hello,
When I build OpenSSL with shared libraries the programs that link against
them don't work.
I built openssl on an Solaris 2.6 machine with gcc version 2.95.2 19991024
(release) and the stock ld (ld -V gives: "ld: Software Generation Utilities
- Solaris-ELF (4.0)").
I downloaded openssl-0.9
Jason Boucher wrote:
>
> Hi all,
>
> I'm trying to install SSH (that means SSL too!) on a solaris system (
> sparcstation-20, solaris 8)
> I've got the following error:
>
> ld.so.1: /usr/local/bin/ssh-keygen: fatal:
> /usr/local/lib/libcrypto.so.0.9.6: bad ELF flags value: 256
> Killed
>
> Doe
On Wed, Jan 16, 2002 at 06:02:11PM +0100, Douglas Wikström wrote:
> do you mean this?
>
> delfin ~/dmix/mixes/mix0/ssl>ls -R
> .:
> ca cert0.pem key0.pem openssl.cnf
>
> ./ca:
> b319c4fe.pem bf801f59.pem cert0.pem cert1.pem cert2.pem
> ec419faf.pem
> delfin ~/dmix/mixes/mix0/ssl>openssl
> Ok, SSL_VERIFY_PEER enforces all verification errors to be enforced,
> thus SSL_connect() will result in hard failure, as shown below.
> You will never reach the SSL_get_verify_result() below.
No, you are right, Ive been trying stuff...
> > openssl req -config ${MIX_HOME}/ssl/openssl.cnf -new
On Wed, Jan 16, 2002 at 05:31:21PM +0100, Douglas Wikström wrote:
> /* Override setting from ssl_ctx created in NET_ssl_ctx_new.
> Verify the client peer. */
> SSL_set_verify(ssl, SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE, NULL);
This should be on the client, shouldn't it? Therefore SSL_V
Hello!
I have a simple webserver running HTTPS. It works fine with Navigator,
which leads me to believe that the problem is on my client side.
To init the SSL_CTX I do:
if (SSL_CTX_load_verify_locations(*ssl_ctx, cafile, capath) == 0) {
}
if(SSL_CTX_use_certificate_file(*ssl_ctx, certfile
On Wed, Jan 16, 2002 at 03:12:29PM +0100, Leif Thuresson wrote:
> I want to pass an active SSL connection between two processes.
> What I want to do is to have a service dispatcher listen to port 443
> (for easy firewall penetration). Client requests contains information
> on
> which service they
I want to pass an active SSL connection between two processes.
What I want to do is to have a service dispatcher listen to port 443
(for easy firewall penetration). Client requests contains information
on
which service they want. The dispatcher performs the SSL handshake and
reads the requested s
Shlomi wrote:
>
> Hi All,
>
> I am trying to verify the signature of a certificate using the routine
>X509_verify_cert() but without success:
> When it tries to verify th root certificate it stop with error #7 (certificate
>signature failure).
> I hope someone can help...
>
> Some details abo
On Wed, Jan 16, 2002 at 01:24:35PM +0100, Douglas Wikström wrote:
> I would like to do something much simpler. I would like each of a number
> of servers generate its own keypair, and share the public key, e.g. the
> persons running the servers would physically meet and share their keys.
> Please
On Wed, Jan 16, 2002 at 11:05:15AM +0100, Jan Vittrup Hansen wrote:
> I am designing a message based protocol running across an SSL
> connection. In this protocol I sometimes send quite small messages (e.g.
> 10 bytes), and then wait for a response. However, I realize that
> SSL_write will simply
Ralf,
there's a "vcvars32.bat" in the bin/ folder of your MSVC++. Run this file before
compiling, that should set the standard include paths correctly. (btw "stdio.h" is a
standard C include header that comes with the compiler).
Alternatively, if you don't want to compile the libraries yoursel
Hello!
Right now I am using the normal way of identification, using a CA-cert,
and certs signed using the key of the CA-cert. I.e. something like:
openssl req -config ${MIX_HOME}/ssl/openssl.cnf -new -keyout
$MIX_HOME/ssl/key.p
em -out $MIX_HOME/ssl/newrequest.pem -nodes
openssl ca -batch -conf
> That's expected behaviour. Because of the padding checks the
> EVP_Decrypt*() routines need to store up to one block of data
> internally. As a result you may get less data from
EVP_DecryptUpdate()
> (up to one block less) or more data (one byte less than one block
more)
> than is supp
--> Resent as mail did not arrive at list by 15/1/2002
Hi
I have spent some more time on this and have been unable to
find a solution.
Has anyone been able to pass signed data from Windows to
Linux and back and verify the data using RSA_Sign and
RSA_Verify. If you have, your help is needed. I
Hi,
I am designing a message based protocol running across an SSL
connection. In this protocol I sometimes send quite small messages (e.g.
10 bytes), and then wait for a response. However, I realize that
SSL_write will simply transfer my 10 bytes to a larger buffer, the SSL
record buffer. Now, I
Hi
I have found the answer. The data was revered between the 2 platforms.
By reversing the string I am able to get RSA_verify to work.
Hylton
-Original Message-
From: Hylton Tregenza
Sent: 04 January 2002 11:11
To: [EMAIL PROTECTED]
Subject: RSA_verify question
Hi
I am using RSA_v
Hello,
Has anybody met with any success in using OpenSSL with an application that does I/O using Windows
NT/2000 I/O completion ports? If so,
where does a total neophyte like myself begin trying
to pull this off?
Thanks for your assistance.
Justin E. Kagan
[EMAIL PROTECTED]
Is there a version of OpenSSL available for Microsoft platforms?
Thanks,
Ryan Browne
Wisetec Networks
-
Wisetec Networks
http://www.wisetec.com/
Super Fast DSL - DSL Internet Access
http://www.superfastdsl.com/
Phone: 909-39
"Patrick Li" <[EMAIL PROTECTED]> writes:
> Ok. How about concurrent sends from 2 threads or concurrent
> receives from 2 threads? I think they are not supported either
> right?
Over the same connection? Nope, you need synchronization before you
can do that.
--
Florian Weimer
Hello,
> I know that OpenSSL 0.9.7 will support AES, that's not my question ;) My
> question is, will we be able to use AES in SSL communication?
It is possible, look:
~~$ openssl c_client -connect localhost:443
SSL handshake has read 1896 bytes and written 346 bytes
---
New, TLSv1/SSLv3, Cip
Hi.
I'm trying to get off the ground with two Perl modules that are new to me -
Net::SSLeay or Crypt::SSLeay.
My question really applies to either module since they need similar arguments.
As an example my for question, this snippet is from the Net::SSLeay doc:
($page, $response, %reply_head
Hi
I have spent soem more time on this and have been unable to find a
solution.
Has anyone been able to pass signed data from Windows to Linux and back
and verify the data using RSA_Sign and RSA_Verify. If you have, your
help is needed. I appear to have either exhausted or misunderstood all
reso
Title: need some guidence please...
Greetings,
I am getting "make: Fatal errors" while installing openssl-0.0.6c on my Solaris box (Ultra 1) which runs on Solaris 2.5.1.
The complete error message is like this
*** Error code 1
make: Fatal error: Command failed for target 'cbc_en
I have a server that does checking of the altSUbjectName against the source IP address
of the client connection. When the verify fails the server (my code) closes the
connection with extreme predjudice. What I'd like to do is to have my client (mine so
I have code control) be able to work out t
I am pleased to announce the release of libpkixpq 0.4, a major release.
NEW FEATURES
- documentation
- support for PKCS7 asymmetric encrypted messages.
(OpenPGP symmeric encryption support has been dropped, at
least temporarily.) The PKCS7 asymmetric encryption
include
Hi All,
I am trying to verify the signature of a certificate using the routine
X509_verify_cert() but without success:
When it tries to verify th root certificate it stop with error #7 (certificate
signature failure).
I hope someone can help...
Some details about my check routine:
Following
Hi all,
I'm trying to install SSH (that means SSL too!) on a solaris system (
sparcstation-20, solaris 8)
I've got the following error:
ld.so.1: /usr/local/bin/ssh-keygen: fatal:
/usr/local/lib/libcrypto.so.0.9.6: bad ELF flags value: 256
Killed
Does anybody have any idea what to do?
Thanx
--
29 matches
Mail list logo