Re: where is the private key ?

2001-12-09 Thread Oscar Jacobsson

Your private key is in the file 'user.key', which you have specified by
passing the argument '-out user.key' to the genrsa command.

Your certificate, stored in 'user.crt' does not contain the private key,
hence the name public-key certificate, but the PFX you create
('user.pfx') using the pkcs12 command will. The phrase if I need the
[certificate] in pkcs12 format is a bit misleading, as pkcs12 isn't a
certificate format per se, but rather a format used to transport and
store both private keys and certificates.

//oscar

 Sarath Chandra M wrote:
 
 Hi,
 I am generating client certificates using this method at the openssl
 server:
 
 openssl genrsa -des3 -out user.key 1024
 openssl req -new -config openssl.cnf -key user.key -out user.csr
 openssl ca -config openssl.cnf -cert CA.pem -in user.csr -keyfile
 CA.key -out user.crt
 
 After this, I am exporting the user.crt to the browser for that user.
 Its working fine. Now, I would like
 to know where the private key of the user is ?
 I am using the user.crt to put it in the user entry in the ldap
 server. Does this user.crt contain
 client's private key also ?
 
 If I need the user.crt in pkcs12 format, I use
 openssl pkcs12 -export -in user.crt -inkey user.key -out user.pfx
 
 Anything wrong with this export ? Does it contain the private key ?
 
 I am doing all these without proper knowledge of openssl. Half
 knowledge is dangerous. But I can't
 help it now. So kindly bear with me if there's anything stupid in the
 method above.
 
 thanx and regards
 sarath

__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: argument to app_verify_callback function

2001-12-09 Thread Lutz Jaenicke

On Fri, Dec 07, 2001 at 04:30:21PM -0800, D. K. Smetters wrote:
 I was wondering about the state of support for the argument to
 app_verify_callback. This callback is set by
 SSL_CTX_set_cert_verify_callback to allow the application to
 override the standard verification behavior and was supposed
 to take an app-supplied argument.

I had a short look into the source. Your statement is correct.
I also do not see a reason, why it should not be supported.
You are welcome to submit a patch for inclusion into 0.9.7
(I could also write one myself, but my time is pretty limited
these days).

 The OpenSSL code currently stores that argument and then ignores
 it -- it doesn't pass it on to the callback function at all.
 Comments in the code indicate that people know this, and vary as
 to whether they indicate that it ought to be fixed. The
 documentation still mentions the argument, but has a hasty
 add-on noting that it is currently ignored. Comments in the
 openssl-user mailing list indicate that this is not heavily used,
 so it wouldn't break the world to fix it. (In contrast to adding
 a similar argument to the default_verify_callback, which would be
 nice, but would probably break too much of the world.)

With respect to the verify_callback: changing the API would probably
break too many applications. For Postfix/TLS I utilize the ex_data
feature of the SSL object, for which the verification process is
being performed. This allows to pass connection related verification
information.

 I wanted to know whether someone had decided at some point that
 it ought to stay this way, or whether there was any hope of getting
 a fix into 0.9.7 (it's a ~3-line change, and I'd be happy to supply
 diffs).
 
 (And before you ask, yes, I do have a perfectly reasonable reason
 for wanting to use this which I am happy to explain, but left out
 for brevity's sake.)

You are invited to explain your reasons, if you consider it to be of
interested for other readers of this list. One advantage of mailing lists
is that they can be very informative and stimulating, because you
get an insight into other peoples work.

Best regards,
Lutz
-- 
Lutz Jaenicke [EMAIL PROTECTED]
BTU Cottbus   http://www.aet.TU-Cottbus.DE/personen/jaenicke/
Lehrstuhl Allgemeine Elektrotechnik  Tel. +49 355 69-4129
Universitaetsplatz 3-4, D-03044 Cottbus  Fax. +49 355 69-4153
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



!

2001-12-09 Thread xuehoubird
Title: Mail

__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


[STATUS] OpenSSL (Sun 9-Dec-2001)

2001-12-09 Thread OpenSSL Project


  OpenSSL STATUS   Last modified at
  __   $Date: 2001/11/14 21:21:47 $

  DEVELOPMENT STATE

o  OpenSSL 0.9.7:  Under development...
o  OpenSSL 0.9.6b: Released on July   9th, 2001
o  OpenSSL 0.9.6a: Released on April  5th, 2001
o  OpenSSL 0.9.6:  Released on September 24th, 2000
o  OpenSSL 0.9.5a: Released on April  1st, 2000
o  OpenSSL 0.9.5:  Released on February  28th, 2000
o  OpenSSL 0.9.4:  Released on August09th, 1999
o  OpenSSL 0.9.3a: Released on May   29th, 1999
o  OpenSSL 0.9.3:  Released on May   25th, 1999
o  OpenSSL 0.9.2b: Released on March 22th, 1999
o  OpenSSL 0.9.1c: Released on December  23th, 1998

  RELEASE SHOWSTOPPERS

o BIGNUM library failures on 64-bit platforms (0.9.7-dev):
  - BN_mod_mul verificiation (bc) fails for solaris64-sparcv9-cc

  AVAILABLE PATCHES

o 

  IN PROGRESS

o Steve is currently working on (in no particular order):
ASN1 code redesign, butchery, replacement.
OCSP
EVP cipher enhancement.
Enhanced certificate chain verification.
Private key, certificate and CRL API and implementation.
Developing and bugfixing PKCS#7 (S/MIME code).
Various X509 issues: character sets, certificate request extensions.
o Geoff and Richard are currently working on:
ENGINE (the new code that gives hardware support among others).
o Richard is currently working on:
UI (User Interface)
UTIL (a new set of library functions to support some higher level
  functionality that is currently missing).
Shared library support for VMS.
Kerberos 5 authentication
Constification
OCSP

  NEEDS PATCH

o  All 'openssl' subprograms taking '-des' and '-des3' options should
   include AES support (0.9.7-dev)

o  'openssl speed' should include AES support (0.9.7-dev)

o  apps/ca.c: Sign the certificate? - n creates empty certificate file

o  OpenSSL_0_9_6-stable:
   #include openssl/e_os.h in exported header files is illegal since
   e_os.h is suitable only for library-internal use.

o  Whenever strncpy is used, make sure the resulting string is NULL-terminated
   or an error is reported

o  OpenSSL STATUS is never up-to-date.

  OPEN ISSUES

o  The Makefile hierarchy and build mechanism is still not a round thing:

   1. The config vs. Configure scripts
  It's the same nasty situation as for Apache with APACI vs.
  src/Configure. It confuses.
  Suggestion: Merge Configure and config into a single configure
  script with a Autoconf style interface ;-) and remove
  Configure and config. Or even let us use GNU Autoconf
  itself. Then we can avoid a lot of those platform checks
  which are currently in Configure.

o  Support for Shared Libraries has to be added at least
   for the major Unix platforms. The details we can rip from the stuff
   Ralf has done for the Apache src/Configure script. Ben wants the
   solution to be really simple.

   Status: Ralf will look how we can easily incorporate the
   compiler PIC and linker DSO flags from Apache
   into the OpenSSL Configure script.

   Ulf: +1 for using GNU autoconf and libtool (but not automake,
which apparently is not flexible enough to generate
libcrypto)


o  The perl/ stuff needs a major overhaul. Currently it's
   totally obsolete. Either we clean it up and enhance it to be up-to-date
   with the C code or we also could replace it with the really nice
   Net::SSLeay package we can find under
   http://www.neuronio.pt/SSLeay.pm.html.  Ralf uses this package for a
   longer time and it works fine and is a nice Perl module. Best would be
   to convince the author to work for the OpenSSL project and create a
   Net::OpenSSL or Crypt::OpenSSL package out of it and maintains it for
   us.

   Status: Ralf thinks we should both contact the author of Net::SSLeay
   and look how much effort it is to bring Eric's perl/ stuff up
   to date.
   Paul +1

  WISHES

o  SRP in TLS.
   [wished by:
Dj [EMAIL PROTECTED], Tom Wu [EMAIL PROTECTED],
Tom Holroyd [EMAIL PROTECTED]]

   See http://search.ietf.org/internet-drafts/draft-ietf-tls-srp-00.txt
   as well as http://www-cs-students.stanford.edu/~tjw/srp/.

   Tom Holroyd tells us there is a SRP patch for OpenSSH at
   http://members.tripod.com/professor_tom/archives/, that could
   be useful.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   

openssl/postgres db binding - comments?

2001-12-09 Thread Bear Giles

I've developed a proof-of-concept binding between OpenSSL
and Postgres, via user defined types and functions, and am 
interested in comments whether it would be interesting to 
others.  My binding is *not* ready for primetime yet, but 
it's far enough along to start asking some intelligent questions.

There seem to be three major benefits:

1) it makes the database PKI-aware, at least to the extent that
   you can't store an improperly formatted object.

2) it pushes the crypto library into the database engine, so
   any client can access it.  No need to port the library to 
   Perl/Python/Ruby/Visual Basic/whatever.

There are three classes of functions: accessors that extract a 
field from an object, constructors that generate new objects (e.g., 
DSA parameters or key pairs), and miscellaneous functions that 
perform some other task.

My questions are:

1) is there any interest in storing PKI information in relational
   databases?  Specifically, storing them as PKI objects, not BLOBs 
   or opaque VARCHAR objects.

2) is there any interest in using PKI functions provided by the
   database?

3) which PKI functions would people want to see?  Should the
   database be able to sign certs?  Should it be able to generate
   keypairs?

When thinking about the final item, it's important to remember 
that the database binding can keep some information private. 
The most basic example is a password string required to generate
keypairs because the private key is always encrypted.  This ensures
that the encrypted private key is never visible through the database,
and the password can be protected by a SSL connection.  Of course
some idiot could still store their passwords in the database itself

Alternately, some functions (esp. CA functions) could require 
a unencrypted private key or password kept elsewhere on the system.
Access to these functions would be restricted using the normal 
database access control mechanism.

--
Bear Giles
bgiles (at) coyotesong (dot) com
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Test Fail in BN_mod_mul

2001-12-09 Thread Max Campos

Hi All,
I'm working on porting OpenSSL to the PalmOS platform (the SSLeay port 
just doesn't work for me for a number of reasons).  Anyway, i've gotten 
many pieces of crypto to test OK, and all of bignum except for the 
BN_mod_mul test, which fails only after quite a number of iterations:

This is the line that crashes - line 401 of bn_asm.c (bn_sub_words):
r[1]=(t1-t2-c)BN_MASK2;

I get essentially an error that says that memory has been accessed that 
hasn't been allocated or is out of bounds.

Here's the variable dump:

a: 0x00036E02
b: 0x0003DC2
c: 0
n: 15
r: 0x00036FC2
t1: 354005811
t2: 14090239

Also: i=55 in line 748 (if (!BN_mod_mul(e,a,b,c,ctx))) of bntest.c when it 
crashes.

If you want, I can provide variable dumps for the other levels in the stack 
as well.

All of the rest of the Bignum tests pass (including those past the mod_mul 
test), and i'm at a bit of a loss as to why this one fails.

Any ideas?

- Max

__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



My Mother sent me this 28353

2001-12-09 Thread rekjavik89376_98


Get Your Teeth Bright White Now!
CLICK HERE!
Have you considered professional teeth whitening?If so, you know it usually costs between $300 and $500 from
your local dentist!
CLICK HERE to learn how to professionally whiten your teeth, using the exactsame whitening
system your dentist uses, at a fraction of the cost!
Here's what you'll see:  We will show you what to look for in a whitening system!
We will show you a comparison of the professional grade systems available today, including their average cost!
We know our product is the best on the market, and we back it
with a 30 day money back guarantee!
CLICK HERE!


To be removed from our list, please click here:
[EMAIL PROTECTED]




__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


21ÊÀ¼ÍµÄÌØ´óÉÌ»ú ÉÌÒµÐÅÏ¢·¢²¼µÄÀûÈÐ

2001-12-09 Thread zhenye

 
Èç¹ûÕâ·âÐÅÓ°Ïìµ½ÄúµÄ¹¤×÷£¬»òÕ¼ÓÃÁËÄúµÄʱ¼ä£¬¾ÍÇëÄúÁ¢¼´É¾³ý¡£Èç¹ûÄúÄܳé³öÒ»µãʱ¼äÀ´Á˽â21ÊÀ¼ÍµÄÌØ´óÉÌ»ú£¬¿ÉʹÄúºÍÄúµÄÆóÒµ´ïµ½³É¹¦µÄ¶¥·å£¬Ò»ÇÐÉúÃüµÄ½¡¿µ¿É³ÖÐø·¢Õ¹¶¼²»ÄÜÀ뿪µÄÊÂÒµ¡£Î人ÕñÒµ£¨EVERPURE£©ÒûË®É豸¿ª·¢ÓÐÏÞ¹«Ë¾ÏòÈ«¹ú¸÷µØ³ÏÕдúÀí¡¢¾­ÏúÉÌ¡£¸÷µØÇøÏÞ±¨Ò»Ãû£¬ÁãͶÈ룬Áã·çÏÕ£¬ÎÞÏ޻ر¨£¡

ÎÒÃÇÓÀÔ¶³Ðŵ£¬Èç¹ûÄãÄÜÔÚµØÇòÉÏÕÒµ½¾»Ë®ÄÜÁ¦³¬¹ýÕñÒµ¹«Ë¾EVERPUREÉúÒû»úµÄͬÀà²úÆ·£¬ÕñÒµ¹«Ë¾½«¸øÄã100ÍòÔªÈËÃñ±Ò£¡

Ò»¡¢ÉêÇë´úÀíÌõ¼þ£º
¡ñÉêÇëÈË»òÆóÒµ·¨ÈË´ú±í±ØÐë¾ß±¸Á¼ºÃµÄ×ÛºÏËØÖÊ¡£
¡ñ×Ô¾õ¡¢×ÔÔ¸½ÓÊÜË®ÎÄ»¯½ÌÓý£¬Ìá¸ßˮ֪ʶ¡£
¡ñÔÚËù´úÀíµØÇøÓй̶¨µÄ¾ÓסµØ¡¢¹Ì¶¨µç»°¡£

¶þ¡¢ÕñÒµEVERPUREÈ«ÇòÖªÃûÓû§£º
¡ñÈ«Çò²¨Òô747¡¢DC¿Í»úµÈ100¼ÒÒÔÉϺ½¿Õ¹«Ë¾¼°Êýǧ¼ÜÃñº½»úÉ϶¼ÓÐÕâÖÖÉ豸£» 
¡ñÈ«ÇòÂóµ±ÀÍ¡¢¿ÏµÂ»ù¡¢¿É¿Ú¿ÉÀÖ¡¢°ÙÊ¿ÉÀÖÕâЩÖøÃûµÄ²ÍÒûÒµºÍÒûÁÏÐÐÒµ£» 
¡ñ»¹ÓÐÈ«ÊÀ½çÖªÃû´óÆóÒµÈçÃÀ¹ú¶Å°î¹«Ë¾¡¢µÏ˹ÄáÀÖÔ°¡¢»¨»¨¹«×Ó¾ãÀÖ²¿µÈ£» 
¡ñÈ«Çò±ãÀûÉ̵ꡢʳƷ¹¤ÒµîÒÇæ¼°90%ÒÔÉÏ×Ô¶¯··Âô»úÒµÒ²¶¼ÊÇEVERPUREÖÒʵµÄÓû§£» 
¡ñÃÀ¹ú½¡¢º£¡¢¿ÕÈý¾üºÍÃÀ¹úº£ÉÏ·þÒÛµÄÿËÒ½¢Í§ÉÏ£¬ÉõÖÁÔÚÃÀ¹ú×ÜͳµÄ×ù»ú¿Õ¾üÒ»ºÅÉ϶¼Å䱸ÁËEVERPUREÉúÒû»ú¡£
 
¡ñÎÞÊýÁìµ¼ÐÔ¹¤ÉÌÆóÒµÒÔ¼°Å·ÃÀÈÕǧÍò¸ö¼ÒÍ¥Óû§Ò²¶¼¹ã·ºÊ¹ÓÃEVERPUREÉúÒû»ú¡£

Èý¡¢²úÆ·ÌØÉ«£º
Òý½øÃÀ¹úEVERPURE¹«Ë¾¸ß¼¼ÊõÖÕ¶ËË®´¦Àí¼¼Êõ£¬ÈÙ»ñÃÀ¹ú¹ú¼Ò×î¸ßÎÀÉú±ê×¼ºÍ×î¸ßÒûË®±ê×¼¡£ 
EVERPUREÉúÒû»úͬʱҲ±»ÃÀ¹ú¹ú¼ÒÎÀÉú»ù½ð»áÆÀ¶¨µÚÒ»¼¶³¬¾«ÃÜÉúÒûÓÃË®É豸¡£

ÕñÒµ¹«Ë¾ÒѾ­Ôì¾ÍÁËÊ®¼¸Î»°ÙÍò¸»ÎÌ£¬ÏÂÒ»¸ö¾ÍµÈÄãÁË¡£
  
   ´ËÖÂ
¾´Àñ

   ÕñÒµEVERPUREµç×ÓÉÌÎñ²¿
   ÍøÕ¾£º http://www.china-everpure.com
   µç×ÓÐÅÏ䣺 [EMAIL PROTECTED]
   µç»°£º027-86796627
   ´«Õ棺027-86775406

ͬʱ£¬ÕñÒµ.µç×ÓÉÌÎñ²¿Ê×ÅúÌرðÍƳö£º

1¡¢¸÷ÐÐÒµÓʼþµØÖ·ÁÐ±í£¨6000ÍòµÄÓʼþµØÖ·Êý¾Ý¿â£©£«¸ßËÙÓʼþȺ·¢Èí¼þÌײͣ¬²¢Äܸù¾ÝÄúµÄÐèÒªÌṩ¸÷ÖÖ²»Í¬µÄÓʼþµØÖ·ÁÐ±í¡£
2¡¢ÎªÄúÌṩ¿í´ø£¨10M£©ÉÌÎñÐÅÏ¢´úÀí·¢²¼·þÎñ£¬¿ÉÒÔ°´ÄúµÄÐèÒª½«Ö¸¶¨µÄÄÚÈÝ·¢²¼µ½¸÷ÆóÒµ¡¢¸öÈËÓÊÏä¡£
3¡¢Ìṩһ´Î¹ºÂò£¬ÖÕÉúÉý¼¶£¬²»¶ÏΪÄú¹ºÂòµÄÓʼþµØÖ·ÌṩÉý¼¶¡¢¸üС£

   
ÎÒÃÇÓµÓÐ6000ÍòµÄÓʼþµØÖ·Êý¾Ý¿â£¬ÎÒÃǽ«ÎªÄúÌṩ×îÓÅÖʵķþÎñ!ÎÒÃǽ«ÊÇÄú--21ÊÀ¼Í³É¹¦ÈËÊ¿µÄÊ×Ñ¡!

ÐÐÒµ·ÖÀ฽±í£º
Ò»¡¢¹ú¼Ò»ú¹Ø£¨332Íò£©
1¡¢ÈË´óίԱ»á  2¡¢ÈËÃñÕþ¸®  3¡¢·¨Ôº   4¡¢¼ì²ìÔº  5¡¢Ïû·À  6¡¢¹«°²  7¡¢¹¤ÉÌ
8¡¢Ë°Îñ  9¡¢¹úÍÁ¾Ö  10¡¢³Ç½¨  11¡¢¹æ»®¾Ö  12¡¢»·ÎÀ  13¡¢¼ìÒß  14¡¢ÓÊÕþ  15¡¢µçÐÅ  
16¡¢ÌúµÀ  17¡¢²ÆÕþ¾Ö  18¡¢ÈËÊÂ¾Ö  19¡¢ÀͶ¯¾Ö  20¡¢Ë®Àû  21¡¢Éó¼Æ  22¡¢²¿¶Ó  23¡¢º£¹Ø

¶þ¡¢Õþµ³»ú¹Ø£¨1Íò£©
1¡¢Öйú¹²²úµ³  2¡¢ÃñÖ÷µ³ÅÉ  3¡¢ÕþЭ

Èý¡¢Éç»áÍÅÌ壨311Íò£©
1¡¢¹¤»á  2¡¢¹²ÇàÍÅ¡¢ÇàÁª¡¢Ñ§Áª  3¡¢¸¾Áª  4¡¢ÎÄÁª  5¡¢²ÐÁª  6¡¢¹¤ÉÌÁª  7¡¢Ð­»á  8¡¢Ñ§»á 
 9¡¢ºìÊ®×Ö»á  10¡¢»ù½ð»á  11¡¢¹ØÐÄÏÂÒ»´úЭ»á  12¡¢ÀÏÁäίԱ»á  13¡¢×Ú½ÌÍÅÌå  
14¡¢Éç»áÍÅÌå

ËÄ¡¢ÊÂÒµÐÔµ¥Î»£¨874Íò£©
1¡¢Ñ§Ð£  2¡¢Ò½Ôº  3¡¢ÊÂÎñËù  4¡¢Íâó  5¡¢¼¼Êõ¼à¶½¾Ö  6¡¢×ʲúÆÀ¹À  7¡¢½Ìί
8¡¢±£°²  9¡¢¿ÆÑÐËù  10¡¢Ô°ÒÕ  11¡¢µç̨  12¡¢µçÊǪ́  13¡¢³ö°æ¾Ö  14¡¢±¨Éç
15¡¢ÖÆƬ³§  16¡¢ÖÐ½é  17¡¢¹«Ö¤

Îå¡¢ÆóÒµ£¨¹«Ë¾£©£¨3464Íò£©
1¡¢»úе É豸  2¡¢½¨Öþ ½¨²Ä ×°ÊÎ  3¡¢Îå½ð  4¡¢µç×Ó  5¡¢¼ÆËã»ú 6¡¢»¥ÁªÍø 7¡¢·ÄÖ¯  
8¡¢»¯¹¤  9¡¢¼Òµç  10¡¢·þ×°  11¡¢·¿µØ²ú  12¡¢ÎïÒµ  13¡¢Ó¡Ë¢  14¡¢½ø³ö¿Ú  15¡¢Ê³Æ·  
16¡¢ÒûÁÏ  17¡¢²ÄÁÏ 18¡¢Í¨ÐÅ 19¡¢É̳¡  ³¬ÊÐ 20¡¢°ì¹«É豸  ÎÄ¾ß  21¡¢°ü×°  22¡¢±ö¹Ý  
·¹µê  ¾Æµê  23¡¢³ö°æ  24¡¢¿±Ì½ ²â»æ  25¡¢²ÍÒû  26¡¢Ð¬ ñ  27¡¢º½Ìì º½¿Õ  28¡¢¹¤ÒµÓÃÆ·  
29¡¢»áÒé Õ¹ÀÀ  30¡¢¼Ò¾ß  31¡¢½»Í¨ ÔËÊä  32¡¢¿ó²ú Ò±½ð ½ðÊô¼Ó¹¤  33¡¢ÂÃÐÐÉç ÂÃÓÎ  
34¡¢Å© ÁÖ ÄÁ Óã  35¡¢Æû³µ ĦÍгµ  36¡¢ÇṤ ÊÖ¹¤  37¡¢Çå½à  38¡¢Éç»á·þÎñ  39¡¢Ë®µç ¹©ÈÈ 
 40¡¢Êéµê  41¡¢ÑÌ  42¡¢¾Æ  43¡¢Ò½Ò© ±£½¡  44¡¢ÒÇÆ÷ ÒÇ±í  45¡¢ÒôÏì  46¡¢ÒôÏñ  47¡¢ÔìÖ½ 
Ö½ÖÆÆ·  48¡¢ÉúÎï¼¼Êõ ÉúÎ﹤³Ì  49¡¢Ê¯ÓÍ ÌìÈ»Æø  50¡¢µç×ÓÉÌÎñ  51¡¢ÓéÀÖ  52¡¢ÈÕÓÃÆ· 
Éú»îÓÃÆ·  53¡¢ÖÆÔì  54¡¢ËÜÁÏ Ëܽº

Áù¡¢½ðÈÚ£¨1018Íò£©
1¡¢ÒøÐÐ  2¡¢Ö¤È¯  3¡¢Í¶×ʹ«Ë¾  3¡¢ÅÄÂô  4¡¢ÐÅÍÐ  5¡¢±£ÏÕ  7¡¢·¿µØ²ú  8¡¢ÆóÒµ¹ÜÀí  
9¡¢¹ã¸æ  10¡¢È˲ŠÕÐƸ ÁÔÍ·  11¡¢´úÀí
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



21ÊÀ¼ÍµÄÌØ´óÉÌ»ú ÉÌÒµÐÅÏ¢·¢²¼µÄÀûÈÐ

2001-12-09 Thread zhenye

 
Èç¹ûÕâ·âÐÅÓ°Ïìµ½ÄúµÄ¹¤×÷£¬»òÕ¼ÓÃÁËÄúµÄʱ¼ä£¬¾ÍÇëÄúÁ¢¼´É¾³ý¡£Èç¹ûÄúÄܳé³öÒ»µãʱ¼äÀ´Á˽â21ÊÀ¼ÍµÄÌØ´óÉÌ»ú£¬¿ÉʹÄúºÍÄúµÄÆóÒµ´ïµ½³É¹¦µÄ¶¥·å£¬Ò»ÇÐÉúÃüµÄ½¡¿µ¿É³ÖÐø·¢Õ¹¶¼²»ÄÜÀ뿪µÄÊÂÒµ¡£Î人ÕñÒµ£¨EVERPURE£©ÒûË®É豸¿ª·¢ÓÐÏÞ¹«Ë¾ÏòÈ«¹ú¸÷µØ³ÏÕдúÀí¡¢¾­ÏúÉÌ¡£¸÷µØÇøÏÞ±¨Ò»Ãû£¬ÁãͶÈ룬Áã·çÏÕ£¬ÎÞÏ޻ر¨£¡

ÎÒÃÇÓÀÔ¶³Ðŵ£¬Èç¹ûÄãÄÜÔÚµØÇòÉÏÕÒµ½¾»Ë®ÄÜÁ¦³¬¹ýÕñÒµ¹«Ë¾EVERPUREÉúÒû»úµÄͬÀà²úÆ·£¬ÕñÒµ¹«Ë¾½«¸øÄã100ÍòÔªÈËÃñ±Ò£¡

Ò»¡¢ÉêÇë´úÀíÌõ¼þ£º
¡ñÉêÇëÈË»òÆóÒµ·¨ÈË´ú±í±ØÐë¾ß±¸Á¼ºÃµÄ×ÛºÏËØÖÊ¡£
¡ñ×Ô¾õ¡¢×ÔÔ¸½ÓÊÜË®ÎÄ»¯½ÌÓý£¬Ìá¸ßˮ֪ʶ¡£
¡ñÔÚËù´úÀíµØÇøÓй̶¨µÄ¾ÓסµØ¡¢¹Ì¶¨µç»°¡£

¶þ¡¢ÕñÒµEVERPUREÈ«ÇòÖªÃûÓû§£º
¡ñÈ«Çò²¨Òô747¡¢DC¿Í»úµÈ100¼ÒÒÔÉϺ½¿Õ¹«Ë¾¼°Êýǧ¼ÜÃñº½»úÉ϶¼ÓÐÕâÖÖÉ豸£» 
¡ñÈ«ÇòÂóµ±ÀÍ¡¢¿ÏµÂ»ù¡¢¿É¿Ú¿ÉÀÖ¡¢°ÙÊ¿ÉÀÖÕâЩÖøÃûµÄ²ÍÒûÒµºÍÒûÁÏÐÐÒµ£» 
¡ñ»¹ÓÐÈ«ÊÀ½çÖªÃû´óÆóÒµÈçÃÀ¹ú¶Å°î¹«Ë¾¡¢µÏ˹ÄáÀÖÔ°¡¢»¨»¨¹«×Ó¾ãÀÖ²¿µÈ£» 
¡ñÈ«Çò±ãÀûÉ̵ꡢʳƷ¹¤ÒµîÒÇæ¼°90%ÒÔÉÏ×Ô¶¯··Âô»úÒµÒ²¶¼ÊÇEVERPUREÖÒʵµÄÓû§£» 
¡ñÃÀ¹ú½¡¢º£¡¢¿ÕÈý¾üºÍÃÀ¹úº£ÉÏ·þÒÛµÄÿËÒ½¢Í§ÉÏ£¬ÉõÖÁÔÚÃÀ¹ú×ÜͳµÄ×ù»ú¿Õ¾üÒ»ºÅÉ϶¼Å䱸ÁËEVERPUREÉúÒû»ú¡£
 
¡ñÎÞÊýÁìµ¼ÐÔ¹¤ÉÌÆóÒµÒÔ¼°Å·ÃÀÈÕǧÍò¸ö¼ÒÍ¥Óû§Ò²¶¼¹ã·ºÊ¹ÓÃEVERPUREÉúÒû»ú¡£

Èý¡¢²úÆ·ÌØÉ«£º
Òý½øÃÀ¹úEVERPURE¹«Ë¾¸ß¼¼ÊõÖÕ¶ËË®´¦Àí¼¼Êõ£¬ÈÙ»ñÃÀ¹ú¹ú¼Ò×î¸ßÎÀÉú±ê×¼ºÍ×î¸ßÒûË®±ê×¼¡£ 
EVERPUREÉúÒû»úͬʱҲ±»ÃÀ¹ú¹ú¼ÒÎÀÉú»ù½ð»áÆÀ¶¨µÚÒ»¼¶³¬¾«ÃÜÉúÒûÓÃË®É豸¡£

ÕñÒµ¹«Ë¾ÒѾ­Ôì¾ÍÁËÊ®¼¸Î»°ÙÍò¸»ÎÌ£¬ÏÂÒ»¸ö¾ÍµÈÄãÁË¡£
  
   ´ËÖÂ
¾´Àñ

   ÕñÒµEVERPUREµç×ÓÉÌÎñ²¿
   ÍøÕ¾£º http://www.china-everpure.com
   µç×ÓÐÅÏ䣺 [EMAIL PROTECTED]
   µç»°£º027-86796627
   ´«Õ棺027-86775406

ͬʱ£¬ÕñÒµ.µç×ÓÉÌÎñ²¿Ê×ÅúÌرðÍƳö£º

1¡¢¸÷ÐÐÒµÓʼþµØÖ·ÁÐ±í£¨6000ÍòµÄÓʼþµØÖ·Êý¾Ý¿â£©£«¸ßËÙÓʼþȺ·¢Èí¼þÌײͣ¬²¢Äܸù¾ÝÄúµÄÐèÒªÌṩ¸÷ÖÖ²»Í¬µÄÓʼþµØÖ·ÁÐ±í¡£
2¡¢ÎªÄúÌṩ¿í´ø£¨10M£©ÉÌÎñÐÅÏ¢´úÀí·¢²¼·þÎñ£¬¿ÉÒÔ°´ÄúµÄÐèÒª½«Ö¸¶¨µÄÄÚÈÝ·¢²¼µ½¸÷ÆóÒµ¡¢¸öÈËÓÊÏä¡£
3¡¢Ìṩһ´Î¹ºÂò£¬ÖÕÉúÉý¼¶£¬²»¶ÏΪÄú¹ºÂòµÄÓʼþµØÖ·ÌṩÉý¼¶¡¢¸üС£

   
ÎÒÃÇÓµÓÐ6000ÍòµÄÓʼþµØÖ·Êý¾Ý¿â£¬ÎÒÃǽ«ÎªÄúÌṩ×îÓÅÖʵķþÎñ!ÎÒÃǽ«ÊÇÄú--21ÊÀ¼Í³É¹¦ÈËÊ¿µÄÊ×Ñ¡!

ÐÐÒµ·ÖÀ฽±í£º
Ò»¡¢¹ú¼Ò»ú¹Ø£¨332Íò£©
1¡¢ÈË´óίԱ»á  2¡¢ÈËÃñÕþ¸®  3¡¢·¨Ôº   4¡¢¼ì²ìÔº  5¡¢Ïû·À  6¡¢¹«°²  7¡¢¹¤ÉÌ
8¡¢Ë°Îñ  9¡¢¹úÍÁ¾Ö  10¡¢³Ç½¨  11¡¢¹æ»®¾Ö  12¡¢»·ÎÀ  13¡¢¼ìÒß  14¡¢ÓÊÕþ  15¡¢µçÐÅ  
16¡¢ÌúµÀ  17¡¢²ÆÕþ¾Ö  18¡¢ÈËÊÂ¾Ö  19¡¢ÀͶ¯¾Ö  20¡¢Ë®Àû  21¡¢Éó¼Æ  22¡¢²¿¶Ó  23¡¢º£¹Ø

¶þ¡¢Õþµ³»ú¹Ø£¨1Íò£©
1¡¢Öйú¹²²úµ³  2¡¢ÃñÖ÷µ³ÅÉ  3¡¢ÕþЭ

Èý¡¢Éç»áÍÅÌ壨311Íò£©
1¡¢¹¤»á  2¡¢¹²ÇàÍÅ¡¢ÇàÁª¡¢Ñ§Áª  3¡¢¸¾Áª  4¡¢ÎÄÁª  5¡¢²ÐÁª  6¡¢¹¤ÉÌÁª  7¡¢Ð­»á  8¡¢Ñ§»á 
 9¡¢ºìÊ®×Ö»á  10¡¢»ù½ð»á  11¡¢¹ØÐÄÏÂÒ»´úЭ»á  12¡¢ÀÏÁäίԱ»á  13¡¢×Ú½ÌÍÅÌå  
14¡¢Éç»áÍÅÌå

ËÄ¡¢ÊÂÒµÐÔµ¥Î»£¨874Íò£©
1¡¢Ñ§Ð£  2¡¢Ò½Ôº  3¡¢ÊÂÎñËù  4¡¢Íâó  5¡¢¼¼Êõ¼à¶½¾Ö  6¡¢×ʲúÆÀ¹À  7¡¢½Ìί
8¡¢±£°²  9¡¢¿ÆÑÐËù  10¡¢Ô°ÒÕ  11¡¢µç̨  12¡¢µçÊǪ́  13¡¢³ö°æ¾Ö  14¡¢±¨Éç
15¡¢ÖÆƬ³§  16¡¢ÖÐ½é  17¡¢¹«Ö¤

Îå¡¢ÆóÒµ£¨¹«Ë¾£©£¨3464Íò£©
1¡¢»úе É豸  2¡¢½¨Öþ ½¨²Ä ×°ÊÎ  3¡¢Îå½ð  4¡¢µç×Ó  5¡¢¼ÆËã»ú 6¡¢»¥ÁªÍø 7¡¢·ÄÖ¯  
8¡¢»¯¹¤  9¡¢¼Òµç  10¡¢·þ×°  11¡¢·¿µØ²ú  12¡¢ÎïÒµ  13¡¢Ó¡Ë¢  14¡¢½ø³ö¿Ú  15¡¢Ê³Æ·  
16¡¢ÒûÁÏ  17¡¢²ÄÁÏ 18¡¢Í¨ÐÅ 19¡¢É̳¡  ³¬ÊÐ 20¡¢°ì¹«É豸  ÎÄ¾ß  21¡¢°ü×°  22¡¢±ö¹Ý  
·¹µê  ¾Æµê  23¡¢³ö°æ  24¡¢¿±Ì½ ²â»æ  25¡¢²ÍÒû  26¡¢Ð¬ ñ  27¡¢º½Ìì º½¿Õ  28¡¢¹¤ÒµÓÃÆ·  
29¡¢»áÒé Õ¹ÀÀ  30¡¢¼Ò¾ß  31¡¢½»Í¨ ÔËÊä  32¡¢¿ó²ú Ò±½ð ½ðÊô¼Ó¹¤  33¡¢ÂÃÐÐÉç ÂÃÓÎ  
34¡¢Å© ÁÖ ÄÁ Óã  35¡¢Æû³µ ĦÍгµ  36¡¢ÇṤ ÊÖ¹¤  37¡¢Çå½à  38¡¢Éç»á·þÎñ  39¡¢Ë®µç ¹©ÈÈ 
 40¡¢Êéµê  41¡¢ÑÌ  42¡¢¾Æ  43¡¢Ò½Ò© ±£½¡  44¡¢ÒÇÆ÷ ÒÇ±í  45¡¢ÒôÏì  46¡¢ÒôÏñ  47¡¢ÔìÖ½ 
Ö½ÖÆÆ·  48¡¢ÉúÎï¼¼Êõ ÉúÎ﹤³Ì  49¡¢Ê¯ÓÍ ÌìÈ»Æø  50¡¢µç×ÓÉÌÎñ  51¡¢ÓéÀÖ  52¡¢ÈÕÓÃÆ· 
Éú»îÓÃÆ·  53¡¢ÖÆÔì  54¡¢ËÜÁÏ Ëܽº

Áù¡¢½ðÈÚ£¨1018Íò£©
1¡¢ÒøÐÐ  2¡¢Ö¤È¯  3¡¢Í¶×ʹ«Ë¾  3¡¢ÅÄÂô  4¡¢ÐÅÍÐ  5¡¢±£ÏÕ  7¡¢·¿µØ²ú  8¡¢ÆóÒµ¹ÜÀí  
9¡¢¹ã¸æ  10¡¢È˲ŠÕÐƸ ÁÔÍ·  11¡¢´úÀí
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]