Re: Combine certificates into chain

2002-11-24 Thread Karl-Michael Werzowa
Yes, this we use as well. Using LDAP for the authentication, including certs, allows to forget the CRL-stuff, if you need it for authentication on a server or portal. And, compared to CRLs, it is much more real time. Am 2002-11-25 7:53 Uhr schrieb "Jimi Thompson" unter <[EMAIL PROTECTED]>: ... >

is SSL_CTX_new() thread safe (on win32) ?

2002-11-24 Thread Louis Solomon [SteelBytes]
When running this test program I wrote, I _sometimes_ get an error return by SSL_CTX_new(). The error msg is: "SSL routines:SSL_CTX_new:library has no ciphers" Louis Solomon [EMAIL PROTECTED] source and binaries of test program avail from: http://www.steeelbytes.com/temp/openssl_bug_test.zi

PLEASE HELP - Porting to TRU 64.

2002-11-24 Thread J
Hi Everyone, On Tru64, while using the des_key_schedule structures for the private session key encryption using a public key (of type RSA pub key), is there anything different I have to code as opposed to the other machines. While I was debugging, the des_key_schedule structures size returned two

RE: Combine certificates into chain

2002-11-24 Thread Jimi Thompson
On Sun, Nov 24, 2002 at 09:29:09PM -0800, Jimi Thompson wrote: > It is also interesting to note that for practical purposes Certificate > Revocation Lists are invalid. While they do exist and are part of the > standard, very few applications are written to take advantage of them. Once > a certific

Re: Combine certificates into chain

2002-11-24 Thread Jason Haar
On Sun, Nov 24, 2002 at 09:29:09PM -0800, Jimi Thompson wrote: > It is also interesting to note that for practical purposes Certificate > Revocation Lists are invalid. While they do exist and are part of the > standard, very few applications are written to take advantage of them. Once > a certifi

RE: Combine certificates into chain

2002-11-24 Thread Jimi Thompson
So Microsoft, trying to be "clever" again, seems to have fooled me into thinking the chain could be in the file, whereas now I know it isn't in my example file and I suspect it can never be. If anyone can confirm this, I'd be interested. Sebastian, This is indeed the case. The

Re: Converting own CA certificate to pkcs12

2002-11-24 Thread Chris Jarshant
- Original Message - From: "Vadim Fedukovich" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Sunday, November 24, 2002 12:46 PM Subject: Re: Converting own CA certificate to pkcs12 > On Fri, Nov 22, 2002 at 01:50:37PM -0500, Chris Jarshant wrote: > > You can't convert a public key ce

Re: engines and keys

2002-11-24 Thread Jonathan Hersch
--- Geoff Thorpe <[EMAIL PROTECTED]> wrote: > The ENGINE is a sort of container for implementations of the various > ***_METHOD implementations, and the "method" tables have always worked > this way too. Ie. upon creation, a structure is linked to a function > table that handles processing. In

Re: Converting own CA certificate to pkcs12

2002-11-24 Thread Vadim Fedukovich
On Fri, Nov 22, 2002 at 01:50:37PM -0500, Chris Jarshant wrote: > You can't convert a public key certificate into a PKCS12 file - > the openssl pkcs12 routine *requires* a private key to be in such > a file along with the public key, which you cannot have (CAs don't > give out their private keys).

Re: Combine certificates into chain

2002-11-24 Thread Sebastian Lisken
Well, I think I've figured it out by myself now. I found and read some information about the way Windows verifies certificates (trying to build a certificate chain with the certificates from its "trusted" store(s), assigning preference values to the chains found, and such). It

Re: Combine certificates into chain

2002-11-24 Thread Sebastian Lisken
> I'm curious. You say your CA gave you a PKCS12 file with > a cert in it, *and* a private key in it? Whose private key > did they give you? If it's yours, then you've just opened a huge security > hole by allowing them access to your private key. If it's someone > else's, can you send it to m

Re: IMPORTANT: The release of 0.9.6h is postponed

2002-11-24 Thread Jeffrey Altman
> In message <[EMAIL PROTECTED]> on Sat, 23 Nov 2002 13:36:43 >-0500, Geoff Thorpe <[EMAIL PROTECTED]> said: > > geoff> But then we already knew that - Peter Gutmann had pointed out in the past > geoff> that a single write of zeroes to disk or memory doesn't protect against > geoff> the previou

Re: IMPORTANT: The release of 0.9.6h is postponed

2002-11-24 Thread Richard Levitte - VMS Whacker
In message <[EMAIL PROTECTED]> on Sat, 23 Nov 2002 13:36:43 -0500, Geoff Thorpe <[EMAIL PROTECTED]> said: geoff> But then we already knew that - Peter Gutmann had pointed out in the past geoff> that a single write of zeroes to disk or memory doesn't protect against geoff> the previous values be