In message <CMM.0.91.0.1038677515.jaltman@watsun> on Sat, 30 Nov 2002 12:31:55 EST, 
Jeffrey Altman <[EMAIL PROTECTED]> said:

jaltman> The only thing I have not done yet for VMS is provide default
jaltman> locations for the System-wide and User-specific locations for the
jaltman> storing of CERTS/KEYS and CRLs.
jaltman> 
jaltman> Could some post a description of what is considered standard practice?

Standard practice under VMS is to install with the command procedure
install.com with a directory as argument.  It creates a directory
structure reminding of the one built under /usr/local/ssl on Unix,
with a subdirectory [.VMS] that contains startup scripts,
openssl_startup.com and openssl_utils.com.  openssl_startup.com builds
logical names (like SSLROOT, which points at the top of the created
directory structure), and is basically meant to be run at system
startup.  openssl_utils.com defines command symbols, and is meant to
be run as part of the system-wide login procedure, or any procedure
you want that need those command symbols defined.

Did that answer your question?

-- 
Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
                    \      SWEDEN       \ or +46-708-26 53 44
Procurator Odiosus Ex Infernis                -- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/

Unsolicited commercial email is subject to an archival fee of $400.
See <http://www.stacken.kth.se/~levitte/mail/> for more info.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to