Hi,
if anybody know this problem, please give me some advice.
I made a simple web server with SSLeay in perl, but sometime it
hangs up. It hangs up in accept(). accept() calls read() system call
and the read() system call is always waiting for coming data when it
hangs up. I read a manual of
On Mon, Apr 29, 2002, Paul V Ford-Hutchinson wrote:
> Hi, I can't see this question anywhere - sorry if it's a known issue
> but..
>
> I have an S/MIME message which is not coming over SMTP and so is not
> BASE-64 encoded.
> It arrives as a DER encoded p7 file and "$ openssl pkcs7 ..." ha
On Tue, Apr 30, 2002, Stephen Degler wrote:
> Hi,
>
> I've created a root cert with CA.pl and I'm trying to create a pkcs12
> file with just the public portion, for inclusion in browsers. I try
> the following:
>
Read the FAQ.
--
Dr. Stephen Henson [EMAIL PROTECTED]
OpenSSL Pr
Hi,
yeah true, having been burned by Be when working on their OS I wish the OS
would go away, but not really. I'm glad to hear it might have been
purchased by 3Com (is that true?)
If the OS doesn't have good TCP/IP
stack support such as a lack of getsockopt() it sounds like the OS ne
Ok, let me amend and repeat this request since there wasn't even so much as a "No! BeOS is stupid! Go away!" response to my original message. (Yes, sometimes a flame is better than utter silence ;) )
The biggest problem that I seem to be running into in getting OpenSSL to compile and generate s
Hi!
As i understand, SSL renegotiation is more of a server-side feature than
a client-side one. Is this correct? Do the popular browsers of today
implement client-initiated renegotiation?
Thanks,
Shyamal
__
OpenSSL Project
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
Hi,
I was trying to convert my self created root public key into
pkcs12 format for inclusion in browsers. I tried the following:
openssl pkcs12 -export -nokeys -in demoCA/cacert.pem -out cacert.pfx
This failed, demanding the private key. So then I tried:
openssl pkcs12 -export -nokeys -in
Hi,
I've created a root cert with CA.pl and I'm trying to create a pkcs12
file with just the public portion, for inclusion in browsers. I try
the following:
openssl pkcs12 -export -nokeys -in demoCA/cacert.pem -out foo.pfx
and I get:
31627:error:0906D06C:PEM routines:PEM_read_bio:no start lin
You can create one for yourself, if you have a private key file, pvk.pem,
and corresponding cert file cert.pem. Optionally you can have your CA chain
in ca.pem. Then try the following command
openssl pkcs12 -export -in cert.pem -inkey pvk.pem -certfile ca.pem -name
"John Doe - TestCA" -out outpu
openssl-users, hello!
I am using openssl on windows 2000, but when I comes to the
function
SSL_CTX_use_PrivateKey_file(...),the program stops. If I disable
this function
, SSL_get_error() returns SSL_ERROR_SSL.
What cause this happen, How can I solve it
Hello to everyone,
I'm trying to get X509 Certificates from Outlook Address Book Contact, does
anyone know how to use PR_X509_USER_CERTIFICATE property (how can I get the
certificate from the system store starting from the value of this
property?)? Does anyone know in wich format certif
Chris Cleeland <[EMAIL PROTECTED]> writes:
> On 30 Apr 2002, Eric Rescorla wrote:
> Right. Good point. However, for some reason I remember that we had problems
> with JSSE doing RSA properly, too. But memory is fuzzy anymore.
That could be. I've heard such reports but never really verified the
On 30 Apr 2002, Eric Rescorla wrote:
> Chris Cleeland <[EMAIL PROTECTED]> writes:
> > On Tue, 30 Apr 2002, Ed Moyle wrote:
> > Does anybody know if the "wrong signature length" problems in JSSE have been
> > fixed? Otherwise, I don't think this'll work, even if you code it
> > properly...
> >
Chris Cleeland <[EMAIL PROTECTED]> writes:
> On Tue, 30 Apr 2002, Ed Moyle wrote:
> Does anybody know if the "wrong signature length" problems in JSSE have been
> fixed? Otherwise, I don't think this'll work, even if you code it
> properly...
>
> Check out the following link:
>
>
>http://gro
Hi Chet!
CC2000 trustway card works in appliance devices
(TVPN, TSSL) ,
and run also as a PCI bus card in Pentium
systems.
You can use PKCS#11 interface to access and
accelerate the cryptographic
functions by the card.
The PKCS#7 format of the certificate is transparent
for the interface.
On Tue, 30 Apr 2002, Ed Moyle wrote:
> On Monday, April 29, 2002 09:15, arjan pot [mailto:[EMAIL PROTECTED]] wrote:
>
> > In other words; is it possible to connect with a Java - client through
> > OpenSSL to a server, written in C?
>
> The part about this that sounds hard is the "connect throu
On Monday, April 29, 2002 09:15, arjan pot [mailto:[EMAIL PROTECTED]] wrote:
> In other words; is it possible to connect with a Java - client through
> OpenSSL to a server, written in C?
The part about this that sounds hard is the "connect through OpenSSL" part.
My recommendation would be to us
On Tue, 30 Apr 2002, Richard Levitte - VMS Whacker wrote:
> In message <[EMAIL PROTECTED]> on Mon, 29 Apr 2002
>12:22:32 -0700 (PDT), Tim Jones <[EMAIL PROTECTED]> said:
>
> t0psecret> I'm trying to create password-protected client certs
> t0psecret> with OpenSSL and ssl.ca-0.1.tar.gz. Is this
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
This e-mail and any atta
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
--- Richard Levitte - VMS Whacker
<[EMAIL PROTECTED]> wrote:
> In message
> <[EMAIL PROTECTED]>
> on Mon, 29 Apr 2002 12:22:32 -0700 (PDT), Tim Jones
> <[EMAIL PROTECTED]> said:
>
> t0psecret> I'm trying to create password-protected
> client certs
> t0psecret> with OpenSSL and ssl.ca-0.1.tar.gz.
In message <[EMAIL PROTECTED]> on Tue, 30 Apr
2002 11:03:15 +0200, Joern Sierwald <[EMAIL PROTECTED]> said:
joern> That reminds me of a question I once asked, but didn't get a reply:
joern> pkcs#12 files can contain encrypted certificates or unencrypted certificates.
joern> Since, like you notic
Hi,
Could anybody please send me an example of how to define and use a callback for
the keys and certificates. The examples I have seen from some references do not
seem
to be working.
Thanks
Sri
-
At 10:52 30.04.2002 +0200, you wrote:
>In message <[EMAIL PROTECTED]> on Mon, 29
>Apr 2002 12:22:32 -0700 (PDT), Tim Jones <[EMAIL PROTECTED]> said:
>
>t0psecret> I'm trying to create password-protected client certs
>t0psecret> with OpenSSL and ssl.ca-0.1.tar.gz. Is this what
>t0psecret> "export
On Fri, Apr 26, 2002 at 11:10:33AM +0200, Thorsten Ziegler wrote:
> Is there a possibility to check crl's? I didn't find a hint on that
> topic in the man-pages - but i actually don't believe this function is
> missing, as it is of somewhat great importance regarding the integrity
> of the Certifi
In message <002501c1efce$2dd63900$030a@yoke> on Tue, 30 Apr 2002 00:35:34 +0200,
"Lidia" <[EMAIL PROTECTED]> said:
lidia.castillejo01> EVP_PKEY *clave_publica=NULL;
lidia.castillejo01> clave_publica = EVP_PKEY_new();
lidia.castillejo01>
lidia.castillejo01> int lee_clave_publica(char *fiche
In message <[EMAIL PROTECTED]> on Mon, 29 Apr 2002
12:22:32 -0700 (PDT), Tim Jones <[EMAIL PROTECTED]> said:
t0psecret> I'm trying to create password-protected client certs
t0psecret> with OpenSSL and ssl.ca-0.1.tar.gz. Is this what
t0psecret> "export password" refers to (when creating the key)
Hi !
I need read a public key from pem file (this file content ONLY the public key).
This public key can be RSA,DSA... For this reason i try use:
EVP_PKEY *clave_publica=NULL;
clave_publica = EVP_PKEY_new();
int lee_clave_publica(char *fichero_publica)
{
BIO *bp_publica;
OpenSSL_ad
Hello.
I'm trying to create password-protected client certs
with OpenSSL and ssl.ca-0.1.tar.gz. Is this what
"export password" refers to (when creating the key),
or is there another way? I'm not sure whether the
export password is a permanent password for the cert
or just a one-time password us
30 matches
Mail list logo