oh god I didn't mean that to go to the list. excuse me!
At 01:01 PM 1/18/01 -0800, you wrote:
>if you want ...
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
The RSA patent has expired, so use the RSA code that openssl includes.
/r$
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated
The following page documents all the algorithms implemented by OpenSSL
http://www.openssl.org/docs/crypto/crypto.html
SHA-1, several variants of DES and HMAC are implemented in OpenSSL.
-sridhar natarajan
-Original Message-
From: Muralidhar Ganga [mailto:[EMAIL PROTECTED]]
Sent: Wedne
On Thu, Jan 18, 2001 at 04:02:42PM -0500, Peter Hall wrote:
> I'm looking at a demo in demos/ssl/serv.cpp which uses 2 functions called
> SSL_CTX_use_certificate_file and SSL_CTX_use_PrivateKey_file. The demos
> uses the same
> file name (foo-cert.pem). How can I get create one of these files.
>
if you want some consulting help, I'd be interested in talking
to you.
At 10:16 AM 1/18/01 -0800, you wrote:
>Hi,
>
>We were thinking of using parts of the crypto libary of openssl in our
>product.
>Is anybody have some experience porting to vxWorks ? Is there any place,
>where we get the commerc
I am trying to legally use OpenSSL with OpenSSH. Does anyone know which
toolkits are used in OpenSSL to handle the RSA public key algorithms?
We want to avoid any licensing issues from RSA. Can anyone recommend a good
toolkit that will allow use of the RSA public key algorithm? I understand
tha
I'm looking at a demo in demos/ssl/serv.cpp which uses 2 functions called
SSL_CTX_use_certificate_file and SSL_CTX_use_PrivateKey_file. The demos
uses the same
file name (foo-cert.pem). How can I get create one of these files.
I have used these commands to get a cacert.pem and cakey.pem but I don
On Thu, Jan 18, 2001 at 07:39:22PM +0100, Lutz Jaenicke wrote:
> I have just made the 0.9.0 release of PRNGD available.
The location is
http://www.aet.tu-cottbus.de/personen/jaenicke/postfix_tls/prngd.html
One should not write announcements when already being half out of the door.
Sigh,
outlaw wrote:
>
> My Windows CA database has 112 certs in it.
> You can see those using either IE or the certmgr utility
> .
>
> I'd like to get them all in a format SSL_CTX_load_verify_locations() will
> successfully load.
>
> Using the certificate manager in IE you can export the certs one-by
Hi!
I have just made the 0.9.0 release of PRNGD available.
PRNGD is the Pseudo Random Number Generator Daemon.
It has an EGD compatible interface and is designed to provide entropy
on systems not having /dev/*random devices.
Software supporting EGD style entropy requests are openssh, Apache/mod
Hi,
We were thinking of using parts of the crypto libary of openssl in our
product.
Is anybody have some experience porting to vxWorks ? Is there any place,
where we get the commercial support for this ?
I would appreciate your suggestions.
Thanks
/Murali
begin:vcard
n:Ganga;Muralidhar
tel;
I have the following problem in determining the key usage of a certificate:
after reading a certificate from DER file and converting it to X509 type (by
means of d2i_X509), I try to read the ex_kusage and the ex_xkusage.
But these fields always contain the value: 3452816845 (or CDCDCDCD in hex,
o
Marco Russo wrote:
>
> - Original Message -
> From: "Ben Laurie" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Wednesday, January 17, 2001 7:18 PM
> Subject: Re: BN_rand question
>
> > Marco Russo wrote:
> > >
> > > I need to generate a random polynomial in Zp, with p very large
Hello,
I am running RedHat 6.2 and have recently installed openSSL, by doing the
follwoing:
./config
make
make test
make install
I then created my key and placed it in under
/etc/httpd/conf/ssl.key/www.lithiumsserver.key and then made the following
changes to my Virtual Host (which I don't
On Thu, Jan 18, 2001 at 05:32:02PM +0100, irochira wrote:
> Executing "Openssl s_client" on a "Openssl s_server" with its certificate
>"server.pem",
> ( setting #define TEST_CERT "./server.pem"), I obtain this message
>
> CONNECTED(0003)
> depth=0 /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=S
Executing "Openssl s_client" on a "Openssl s_server" with its certificate "server.pem",
( setting #define TEST_CERT "./server.pem"), I obtain this message
CONNECTED(0003)
depth=0 /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Server test cert (512 bit)
verify error:num=20:unable to get local issu
Executing "Openssl s_client" on a "Openssl s_server" with its certificate "server.pem",
( setting #define TEST_CERT "./server.pem"), I obtain this message
CONNECTED(0003)
depth=0 /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Server test cert (512 bit)
verify error:num=20:unable to get local issu
Go www.modssl.org, and click on Contribution.
You need the files named "certunbundle*" or something.
(cannot connect to modssl.org at the moment).
There is a .tar.gz file and a patch to make it work
with recent versions of distributions of linux.
simos
On Wed, 17 Jan 2001, Rodney Thayer wrote:
Hi,
I develop an OCSP responder, my response is verified when I use openssl ocsp
response -in resp.der -inform DER -verify but the PSM of Netscape rejects
this response.
Any idea ???
Michiels Olivier
__
OpenSSL Project
Date sent: Thu, 18 Jan 2001 16:39:58 +
From: Hannu Krosing <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Copies to: [EMAIL PROTECTED]
Subject:Re: mechanical extraction of roots from netscape?
Send reply to: [E
Rodney Thayer wrote:
>
> In this document:
>
> http://www.kfu.com/~nsayer/encryption/openssl.html
>
> it refers to an Apache file, called ca_bundle.crt, which
> "contains all the roots from Netscape's cert7.db, automatically
> extracted".
I'm not sure but it could be certutil from the Moz
Problem:
An Unix Apache/mod-ssl server .crt/.key pair generated from a
CSR/KEY signed by a self generated CA Cert on 32 bit Windows
will not work with the Netscape 4.72 client running on Linux Redhat
6.2.
However the same CSR/KEY signed by the same self generated CA
Cert on Redhat 6.2 Linux
[EMAIL PROTECTED] wrote:
> when I call RSA_public_encrypt, it should return a char * of 256 chars,
> right ? The returned char is not 256 chars long.
>
> I measure with pointer hopping like this
>
> while (*sp++)
> ;
> This way it should hop to the end of the unsigned char * and it returns the
>
[EMAIL PROTECTED] wrote:
>
> Hi,
>
> I have a simple application which encrypts a piece of text using RSA.
>
> when I call RSA_public_encrypt, it should return a char * of 256 chars,
> right ? The returned char is not 256 chars long.
>
Wrong its unsigned char * and the actual size depends o
- Original Message -
From: "Ben Laurie" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, January 17, 2001 7:18 PM
Subject: Re: BN_rand question
> Marco Russo wrote:
> >
> > I need to generate a random polynomial in Zp, with p very large
(1024-2048
> > bits).
> > Sorry for my
Hi,
I have a simple application which encrypts a piece of text using RSA.
when I call RSA_public_encrypt, it should return a char * of 256 chars,
right ? The returned char is not 256 chars long.
I measure with pointer hopping like this
while (*sp++)
;
This way it should hop to the end of the
26 matches
Mail list logo