Hi Randy,
Thanks for the effort and the reply. I have changed the design of my
library interface to the applications to include a init call so that I
do not need to worry about this.
Warm regards
JBOn 2/28/06, Randy Turner [EMAIL PROTECTED] wrote:
The first sentence of the
:)
Chen Talos [EMAIL PROTECTED]
Sent by:
[EMAIL PROTECTED]
04.03.2006 13:41
Please respond to
openssl-users@openssl.org
To
openssl-users@openssl.org
cc
Subject
another test
Classification
Any kind man please
Hi Samy!!
Regards
raman
I like the way I am ~1~
-Original Message-
From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Samy Thiyagarajan
Sent: Monday, March 06, 2006 2:59
PM
To: openssl-users@openssl.org
Subject: Re: another test
:)
Hello,
is there a quick way/function to verify that a private (EVP_PKEY) key
matches a X509 certificate's public key?
thanks,
--
Julien ALLANOS
__
OpenSSL Project http://www.openssl.org
User
Hi,
Can some one let me know if the SSL protocol specification mandates changes to these values frequently in an ongoing connection?
If not how to enable it using APIs?
Thanks
JB
First, thx to Girish Venkatachalam for the modified certpatch.
If i understand well, I don't really need to use it because open-ssl now support the altsubject so I should be able to add it directly by open-ssl
But what is the command line for this??
My 2nd question is, using isakmpd and the ip
Thanks for so many people's kindest
reply. Now my test is over. So please do not reply thistopic ever.
Talos Chen, 22
Shanghai, China
[EMAIL PROTECTED]使用 MSN Messenger 与联机的朋友进行交流
__
OpenSSL Project
I think functions about ARP and
RARP would help. I know how to do this under Windows, but I have no idea
about such things under *nix.
Talos Chen, 22
Shanghai, China
[EMAIL PROTECTED]
From: "Kyle Hamilton" [EMAIL PROTECTED]Reply-To:
openssl-users@openssl.orgTo:
hello list,
We're using sslproxy (http://sourceforge.net/projects/sslproxy/) to handle https
requests to our server and it's come to my attention Firefox users (non-IE users
I assume really) get a message about not being able to verify the authenticity
of the certificate when they sign onto our
On Mon, Mar 06, 2006, [EMAIL PROTECTED] wrote:
hello list,
We're using sslproxy (http://sourceforge.net/projects/sslproxy/) to handle
https
requests to our server and it's come to my attention Firefox users (non-IE
users
I assume really) get a message about not being able to verify the
I feel so stupid Anyway, these ones seem to work:
./config --prefix=/usr/local/openssl no-asm
./config --prefix=/usr/local/openssl no-idea no-asm
What I did wrong in the past (well... well before disabling the assembly part)
was:
make depends make clean make test make
What I should have
Quoting Dr. Stephen Henson [EMAIL PROTECTED]:
On Mon, Mar 06, 2006, [EMAIL PROTECTED] wrote:
hello list,
We're using sslproxy (http://sourceforge.net/projects/sslproxy/) to handle
https
requests to our server and it's come to my attention Firefox users (non-IE
users
I assume really)
Actually, it was William Rowe Jr., not me. (I'm pleased you thought
of me, but I much prefer that people get the credit they actually
deserve. :) )
Thanks! (And thank you for helping, Mr. Rowe. :) )
-Kyle H
On 3/6/06, Fabro, Loic [EMAIL PROTECTED] wrote:
I feel so stupid Anyway, these
Hello:
I have some directions on how to build a self-signed certificate which
consists of 5 steps.
1) create a key and a request
2) Remove the passphrase from the key (optional)
3) sign the certificate
4) install the cert and the key
5) set the SSLConf to point to the cert and the key.
My
On Mon, Mar 06, 2006, [EMAIL PROTECTED] wrote:
Quoting Dr. Stephen Henson [EMAIL PROTECTED]:
I've already done this except the testing with s_client part, I tested with
firefox which still generates the same error with that. I just tested with
s_client and I get Verify return code 21:
Quoting Dr. Stephen Henson [EMAIL PROTECTED]:
On Mon, Mar 06, 2006, [EMAIL PROTECTED] wrote:
Quoting Dr. Stephen Henson [EMAIL PROTECTED]:
I've already done this except the testing with s_client part, I tested with
firefox which still generates the same error with that. I just tested
So, from SSL you can find the socket and thence the IP, and in theory
you can use things like the ARP ioctls to _try_ to find the MAC (eg
Ethernet) address - however that last part only really works when all
the systems are in the same broadcast domain. If they are on the other
side of a
kloomis wrote:
Hello:
I have some directions on how to build a self-signed certificate which
consists of 5 steps.
1) create a key and a request
2) Remove the passphrase from the key (optional)
3) sign the certificate
4) install the cert and the key
5) set the SSLConf to point to the cert and
On Mon, Mar 06, 2006, [EMAIL PROTECTED] wrote:
Quoting Dr. Stephen Henson [EMAIL PROTECTED]:
On Mon, Mar 06, 2006, [EMAIL PROTECTED] wrote:
Quoting Dr. Stephen Henson [EMAIL PROTECTED]:
I've already done this except the testing with s_client part, I tested
with
firefox
Hi:
Now I'm trying to compile an SSL client/server program in
arm-linux-gcc on my PC,but i encounter a mistake as below,can anybody tell
me how to do with this?My OS is RH9.
Thank you very much!
Sun Ying-ming
[EMAIL PROTECTED] openssl-examples]# makearm-linux-gcc
-g -I/usr/include -Wall -c
Probably you can try the openssl verify command?
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Julien ALLANOS
Sent: Monday, February 06, 2006 6:38 PM
To: openssl-users@openssl.org
Subject: Testing private key - public key consistency
Hello,
is there a
At 11:24 PM 3/6/2006 +0100, you wrote:
Also, does anything
in the process need the privkey.pem file that is created once the cert
and key are created?
privkey.pem is not needed by the process of
certificate generation once the request is generate, but you'll need it
once you want to use this
Please see comments inline with the questions.
On 3/6/06, kloomis [EMAIL PROTECTED] wrote:
Hello:
I have some directions on how to build a self-signed certificate which
consists of 5 steps.
1) create a key and a request
2) Remove the passphrase from the key (optional)
3) sign the
SSLPrivateKeyFile filename
At least that's what it was on older versions of Apache; check the
documentation on mod_ssl for more information.
-Kyle H
On 3/6/06, kloomis [EMAIL PROTECTED] wrote:
At 11:24 PM 3/6/2006 +0100, you wrote:
Also, does anything in the process need the privkey.pem
At 11:17 PM 3/6/2006 -0700, you wrote:
The practical upshot of this is, yes, your
apache configuration needs
the privkey.pem file in order to do SSL/TLS at
all.
I have myServer.csr, myServer.cert and myServer.key located in ssl.csr,
ssl.crt, and ssl.key respectively. The ssl.conf points to the
Verify normally verifies a certificate chain, I think this isn't quite
what the original poster is trying to achieve.
I think he is interested in what the SSL_CTX_check_private_key function
can achieve. However I don't know if there is an OpenSSL utility that
can do this. Maybe verify can
26 matches
Mail list logo