Based on openssl-engine-0.9.6c, we have developed a new engine which
allowsopenssl applications and Apache-mod_ssl servers to use through a
PKCS#11interface the security functions provided by the Bull trustway cc2000
cryptographiccard, taking advantage of key storage in secure memory and
Solar Designer wrote:
Hi,
This sounds like a bug to me. Noticed it last year and I've just
checked that it's still not resolved in the latest snapshot.
jill!solar:~/build/openssl-SNAP-20020416$ apps/openssl dgst -md5 /bin/ls
MD5(/bin/ls)= d93498d9f52c3dc0330ab930fe3ffc50
OK.
On Tue, Apr 23, 2002 at 03:05:30PM +0200, Martin MOKREJŠ wrote:
Hi,
I compiled openssl-0.9.6d-beta1 on Sgi Iriux 6.5.11 with gcc 2.95.3 and got
the following error when running the make test
[...]
OpenSSL 0.9.6d-beta1 17 Apr 2002
built on: Tue Apr 23 12:57:56 CEST 2002
platform:
On Mon, Apr 22, 2002 at 05:24:04PM -0300, Raphael Amorim wrote:
I need to generate PKCS#12 private key files from CryptoApi Key
Containers. I'd tried to use Xenroll, OpenSSL and the RSA's PKCS#12
specification, but the files I'm generating have not been recognized as
valid pkcs#12 files by
Hi,
I compiled openssl-0.9.6d-beta1 on Sgi Iriux 6.5.11 with gcc 2.95.3 and got
the following error when running the make test
[...]
The following command should have some OK's and some failures
There are definitly a few expired certificates
../apps/openssl verify -CApath ../certs
They're using OpenSSL.
By the way, you know how to use the pkcs12 command passing
the container name(key pair holder in CryptoAPI) as -name
parameter to obtain a .p12 file?
Best Regards.
Raphael Amorim
On Tue, 23 Apr 2002 20:20:27 +0200
Lutz Jaenicke [EMAIL PROTECTED] wrote:
On Mon, Apr 22,
On Tue, Apr 23, 2002 at 02:05:15PM -0500, raphael amorim wrote:
They're using OpenSSL.
By the way, you know how to use the pkcs12 command passing
the container name(key pair holder in CryptoAPI) as -name
parameter to obtain a .p12 file?
??? I don't know CryptoAPI.
The -name option is
Title: CyberShops - 50% Off Membership Free Vacation Offer - (1001)
SAVE UP TO 85% ON NAME
BRAND PRODUCTS!
See What's In Store For YOU!
CyberShops is a collection of the finest stores and services from around
the corner and around the world assembled to bring our Members the best
money
Target
Emailing Creative Services
Home
of 'EMail-IT' True Stealth System
Ph:
407-539-0615
??? WOULD SOMEONE PLEASE STOP THIS SPAM ???
O Ernest E. Vogelsinger
(\) ICQ# 13394035
^
Hi,
I'm trying to use PKCS7 to encode my data. I looked at the 'enc.c' file of
openssl source, and it outlines a series of steps to encode data. But, I
don't understand how and who generates the encryption key.
Is there any way, I can specify the symmetric encryption key that the PKCS
--- Corinna Vinschen [EMAIL PROTECTED] wrote:
Date: Sat, 20 Apr 2002 18:21:30 +0200
From: Corinna Vinschen [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: OpenSSL 0.9.6d beta 1 testing results
Reply-to: [EMAIL PROTECTED]
On Fri, Apr 19, 2002 at 06:36:47PM -0400, Michael
Kobar wrote:
On Tue, Apr 23, 2002 at 12:09:14PM +0100, Ben Laurie wrote:
Solar Designer wrote:
This sounds like a bug to me. Noticed it last year and I've just
checked that it's still not resolved in the latest snapshot.
jill!solar:~/build/openssl-SNAP-20020416$ apps/openssl dgst -md5 /bin/ls
Is it not incumbant upon the openssl.org mailing
list maintainer(s) to prevent spam from making it onto the mailing lists?
Generally speaking you will want to restrict posting to list members, and for
lists such as openssl-announce require moderation approval.
Kurt Seifried, [EMAIL
14 matches
Mail list logo