On Sat, 2003-08-23 at 15:25, Dr. Stephen Henson wrote:
> On Sat, Aug 23, 2003, Nick Gray wrote:
>
> > Dr Henson,
> >
> >
> > > Try deleting the demoCA tree and doing CA.pl -newca again.
> > >
> >
> > That isn't it. I tried that first. I am assuming the demoCA that it
> > looks for is in the cu
On Sat, Aug 23, 2003, Nick Gray wrote:
> Dr Henson,
>
>
> > Try deleting the demoCA tree and doing CA.pl -newca again.
> >
>
> That isn't it. I tried that first. I am assuming the demoCA that it
> looks for is in the current working directory.
>
Yes.
> > Also check openssl.cnf is somewhere
Hello:
I'm rigth ?? if i'm right how can i know the key that is being used for
decrypt the message ??
I have my problem fixed yet thanks :)
---
Best regards
Carlos Guzmán Álvarez
Vigo-Spain
_
Localiza y ponte en contacto con tus
Dr Henson,
> Try deleting the demoCA tree and doing CA.pl -newca again.
>
That isn't it. I tried that first. I am assuming the demoCA that it
looks for is in the current working directory.
> Also check openssl.cnf is somewhere usable or OPENSSL_CONF points to it or the
> req command will give
On Thu, Aug 21, 2003, Rohan Pinto wrote:
>
> I have a SunONE WebServer 6.0 running on a certain subnet. (www.abcd.com -
> for this example)
> The Webserver serves content over http.
> I intend to protect this content via PDC authentication. To do so, I'd need
> 2 things.
> 1. A Server Cert
> 2. A
Hello:
The key derivation and encryption for TLS is done in ssl/t1_enc.c there's
actually some debugging code in there already so if you #define TLS_DEBUG
it
should print out all the keys for you.
I'm making more test using debugging features of openssl ( nice features ),
i'm trying to build