Re: Few general questions
Edward Chan a écrit: So to use native windows async i/o, I need to do the I/O myself (using bio pairs). Then I assume there is an easy way to figure out the ciphers and things agreed upon during the ssl handshake? Is this stuff readily available in the SSL object? At the risk of sounding lazy, what API's do I need to use to determine this info? :) Thanks, Ed There is an example using BIO_pair in the ssl directory, ssltest.c I think it can be a good entry point. Sylvain __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
Signed PKCS#7 without a certificate included ?
Hi I'm trying to make a signed and encrypted PKCS#7 message with a footprint as small as possible. So my (probably dumb) question is: Is it possible not to include signers certificate in the PKCS#7 ? The PKCS7_Sign() function does not seem to allow it. When the receiver wants to verify the signature, he then of course has to supply signers certificate himself somehow, in order to perform the verification. Med venlig hilsen / Best regards Kim Hellan ___ www.kmd.dk www.kundenet.kmd.dk www.eboks.dk www.civitas.dk www.netborger.dk Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og sletter den. KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og borgerne. If you received this e-mail by mistake, please notify me and delete it. Thank you. Our mission is to enhance the efficiency of the public sector and improve its service of the general public. __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
Re: Signed PKCS#7 without a certificate included ?
On Friday September 3rd 2004 Hellan.Kim KHE wrote: I'm trying to make a signed and encrypted PKCS#7 message with a footprint as small as possible. So my (probably dumb) question is: Is it possible not to include signers certificate in the PKCS#7 ? The PKCS7_Sign() function does not seem to allow it. PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, BIO *data, int flags); Use PKCS7_NOCERTS in the 'flags' argument. When the receiver wants to verify the signature, he then of course has to supply signers certificate himself somehow, in order to perform the verification. Yes. -- Marco Roeland __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
SV: Signed PKCS#7 without a certificate included ?
Hi, If I use the PKCS7_NOCERTS flag and use NULL in the signcert argument, I still get access violations. The problem is in x509_cmp.c file in the X509_check_private_key() function. The lines say: int X509_check_private_key(X509 *x, EVP_PKEY *k) { EVP_PKEY *xk=NULL; int ok=0; xk=X509_get_pubkey(x); if (xk-type != k-type) since x is NULL, then xk is also NULL, so the if line crashes the application. Any other ideas ? Thanks, Kim -Oprindelig meddelelse- Fra: Marco Roeland [mailto:[EMAIL PROTECTED] vegne af Marco Roeland Sendt: 3. september 2004 11:16 Til: [EMAIL PROTECTED] Cc: Hellan.Kim KHE Emne: Re: Signed PKCS#7 without a certificate included ? On Friday September 3rd 2004 Hellan.Kim KHE wrote: I'm trying to make a signed and encrypted PKCS#7 message with a footprint as small as possible. So my (probably dumb) question is: Is it possible not to include signers certificate in the PKCS#7 ? The PKCS7_Sign() function does not seem to allow it. PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, BIO *data, int flags); Use PKCS7_NOCERTS in the 'flags' argument. When the receiver wants to verify the signature, he then of course has to supply signers certificate himself somehow, in order to perform the verification. Yes. -- Marco Roeland ___ www.kmd.dk www.kundenet.kmd.dk www.eboks.dk www.civitas.dk www.netborger.dk Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og sletter den. KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og borgerne. If you received this e-mail by mistake, please notify me and delete it. Thank you. Our mission is to enhance the efficiency of the public sector and improve its service of the general public. __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
SV: Signed PKCS#7 without a certificate included ?
Disregard the last mail. You, of course, must still supply a signer certificate, it's just not included in the PKCS#7. Sorry! /Kim -Oprindelig meddelelse- Fra: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] vegne af Hellan.Kim KHE Sendt: 3. september 2004 12:35 Til: Marco Roeland; [EMAIL PROTECTED] Emne: SV: Signed PKCS#7 without a certificate included ? Hi, If I use the PKCS7_NOCERTS flag and use NULL in the signcert argument, I still get access violations. The problem is in x509_cmp.c file in the X509_check_private_key() function. The lines say: int X509_check_private_key(X509 *x, EVP_PKEY *k) { EVP_PKEY *xk=NULL; int ok=0; xk=X509_get_pubkey(x); if (xk-type != k-type) since x is NULL, then xk is also NULL, so the if line crashes the application. Any other ideas ? Thanks, Kim -Oprindelig meddelelse- Fra: Marco Roeland [mailto:[EMAIL PROTECTED] vegne af Marco Roeland Sendt: 3. september 2004 11:16 Til: [EMAIL PROTECTED] Cc: Hellan.Kim KHE Emne: Re: Signed PKCS#7 without a certificate included ? On Friday September 3rd 2004 Hellan.Kim KHE wrote: I'm trying to make a signed and encrypted PKCS#7 message with a footprint as small as possible. So my (probably dumb) question is: Is it possible not to include signers certificate in the PKCS#7 ? The PKCS7_Sign() function does not seem to allow it. PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, BIO *data, int flags); Use PKCS7_NOCERTS in the 'flags' argument. When the receiver wants to verify the signature, he then of course has to supply signers certificate himself somehow, in order to perform the verification. Yes. -- Marco Roeland ___ www.kmd.dk www.kundenet.kmd.dk www.eboks.dk www.civitas.dk www.netborger.dk Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og sletter den. KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og borgerne. If you received this e-mail by mistake, please notify me and delete it. Thank you. Our mission is to enhance the efficiency of the public sector and improve its service of the general public. __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED] ___ www.kmd.dk www.kundenet.kmd.dk www.eboks.dk www.civitas.dk www.netborger.dk Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og sletter den. KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og borgerne. If you received this e-mail by mistake, please notify me and delete it. Thank you. Our mission is to enhance the efficiency of the public sector and improve its service of the general public. ___ www.kmd.dk www.kundenet.kmd.dk www.eboks.dk www.civitas.dk www.netborger.dk Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og sletter den. KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og borgerne. If you received this e-mail by mistake, please notify me and delete it. Thank you. Our mission is to enhance the efficiency of the public sector and improve its service of the general public. __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
SV: Signed PKCS#7 without a certificate included ?
Hi again In the other end I normally use PKCS7_verify() in order to verify the signature and get the signed text. This function also fails since there is no signer certificate in the PKCS#7. Do you know how to handle signature verification and text retrieval in the receiver end ? Any help much appreciated! /Kim -Oprindelig meddelelse- Fra: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] vegne af Hellan.Kim KHE Sendt: 3. september 2004 12:42 Til: [EMAIL PROTECTED]; Marco Roeland Emne: SV: Signed PKCS#7 without a certificate included ? Disregard the last mail. You, of course, must still supply a signer certificate, it's just not included in the PKCS#7. Sorry! /Kim -Oprindelig meddelelse- Fra: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] vegne af Hellan.Kim KHE Sendt: 3. september 2004 12:35 Til: Marco Roeland; [EMAIL PROTECTED] Emne: SV: Signed PKCS#7 without a certificate included ? Hi, If I use the PKCS7_NOCERTS flag and use NULL in the signcert argument, I still get access violations. The problem is in x509_cmp.c file in the X509_check_private_key() function. The lines say: int X509_check_private_key(X509 *x, EVP_PKEY *k) { EVP_PKEY *xk=NULL; int ok=0; xk=X509_get_pubkey(x); if (xk-type != k-type) since x is NULL, then xk is also NULL, so the if line crashes the application. Any other ideas ? Thanks, Kim -Oprindelig meddelelse- Fra: Marco Roeland [mailto:[EMAIL PROTECTED] vegne af Marco Roeland Sendt: 3. september 2004 11:16 Til: [EMAIL PROTECTED] Cc: Hellan.Kim KHE Emne: Re: Signed PKCS#7 without a certificate included ? On Friday September 3rd 2004 Hellan.Kim KHE wrote: I'm trying to make a signed and encrypted PKCS#7 message with a footprint as small as possible. So my (probably dumb) question is: Is it possible not to include signers certificate in the PKCS#7 ? The PKCS7_Sign() function does not seem to allow it. PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, BIO *data, int flags); Use PKCS7_NOCERTS in the 'flags' argument. When the receiver wants to verify the signature, he then of course has to supply signers certificate himself somehow, in order to perform the verification. Yes. -- Marco Roeland ___ www.kmd.dk www.kundenet.kmd.dk www.eboks.dk www.civitas.dk www.netborger.dk Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og sletter den. KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og borgerne. If you received this e-mail by mistake, please notify me and delete it. Thank you. Our mission is to enhance the efficiency of the public sector and improve its service of the general public. __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED] ___ www.kmd.dk www.kundenet.kmd.dk www.eboks.dk www.civitas.dk www.netborger.dk Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og sletter den. KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og borgerne. If you received this e-mail by mistake, please notify me and delete it. Thank you. Our mission is to enhance the efficiency of the public sector and improve its service of the general public. ___ www.kmd.dk www.kundenet.kmd.dk www.eboks.dk www.civitas.dk www.netborger.dk Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og sletter den. KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og borgerne. If you received this e-mail by mistake, please notify me and delete it. Thank you. Our mission is to enhance the efficiency of the public sector and improve its service of the general public. __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED] ___ www.kmd.dk www.kundenet.kmd.dk www.eboks.dk www.civitas.dk www.netborger.dk Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og sletter den. KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og borgerne. If you received this e-mail by mistake, please notify me and delete it. Thank you. Our mission is to enhance the efficiency of the public sector and improve its service
Re: SV: Signed PKCS#7 without a certificate included ?
On Friday September 3rd 2004 Hellan.Kim KHE wrote: You, of course, must still supply a signer certificate, it's just not included in the PKCS#7. Correct. Sorry! Heh, no problem! OpenSSL is great, but it does take some time to learn! Once you get over that it's very powerful and flexible. -- Marco Roeland __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
SSL Handshake custom implementation
Greetings, I am interested in a rough quick experiment with the SSL handshake process. My idea is to custom create the handshake layer in SSL with my own version of SSL handshake, keeping everything else intact in the SSL protocol. I am wondering if I can use some library/command line (such as, openssl) that shall allow me to tweak around the SSL handshake instead of rewriting the complete protocol. Any documentation on the implementation of the SSL handshake will also be quite useful. Any ideas? Thanx in advance, Gracias, Amit PS. I am relatively new to openssl. Incase therez some pre-requisite to do so using openssl, please advice. __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
read certificate
Hi, If I have a certificate in a buffer (get it via TLS connection) Right now I use CryptoAPI and CryptEncrypt to read the public key and encrypt my key( the pre msaterkey) with it. What would I do in OpenSSL to achive the same thing? any example? regards Niklas _ Hitta rätt på nätet med MSN Sök http://search.msn.se/ __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
How to create a certificate silently
Title: How to create a certificate silently Hi, I use the openssl to create a self signed certificate, but it needs interactively input country name, province name, ... Common name. I am wondering if there is a way to do it silently, i.e. let it read those response from a configure file? Because I want to run the openssl command in a script and don't want user to input any thing. I badly need your help! Thanks, Louis
OpenSSL and CMS
Hello! I'm writing you because I would like to know if Opessl is planning to support the Cryptographic Message Syntax (CMS) for the PKCS#7, and in that case, when it could be possible to be available. Thanks for your answers, Regards, Antonio. __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
Re: How to create a certificate silently
On Fri, Sep 03, 2004 at 11:19:37AM -0400, Lule Chen wrote: Hi, I use the openssl to create a self signed certificate, but it needs interactively input country name, province name, ... Common name. I am wondering if there is a way to do it silently, i.e. let it read those response from a configure file? Because I want to run the openssl command in a script and don't want user to input any thing. I badly need your help! Use Expect. -- Some days it's just not worth chewing through the restraints... Mark D. Foster, CISSP [EMAIL PROTECTED] http://mark.foster.cc/ pgpPuZVqnIYd5.pgp Description: PGP signature
RE: How to create a certificate silently
Title: RE: How to create a certificate silently Thanks, but I am new to openssl. Could you give me a little bit more detail of the usage? Lule -Original Message- From: Mark Foster [mailto:[EMAIL PROTECTED]] Sent: Friday, September 03, 2004 12:39 PM To: [EMAIL PROTECTED] Subject: Re: How to create a certificate silently On Fri, Sep 03, 2004 at 11:19:37AM -0400, Lule Chen wrote: Hi, I use the openssl to create a self signed certificate, but it needs interactively input country name, province name, ... Common name. I am wondering if there is a way to do it silently, i.e. let it read those response from a configure file? Because I want to run the openssl command in a script and don't want user to input any thing. I badly need your help! Use Expect. -- Some days it's just not worth chewing through the restraints... Mark D. Foster, CISSP [EMAIL PROTECTED] http://mark.foster.cc/
Changing md5WithRSAEncryption Sig Alg to SHA1?
CSRs are generated with MD5 as the default signature algorithm. I'd like to use SHA1 instead of MD5. I've searched around (Google, openssl-users archives) but haven't found anything. Manpages don't mention anything regarding changing it. Please advise on how to accomplish this. Thanks, C __ Do you Yahoo!? Take Yahoo! Mail with you! Get it on your mobile phone. http://mobile.yahoo.com/maildemo __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
Removing passphrase for Apache server
Hi, I have Apache 2.50.0 with the mod_ssl enabled on an AIX 5.1 machine. I compiled openssl-0.9.7d with the gcc compiler. When I first installed the key, I wanted to create it with no passphrase, but it said I needed a minimum of 4 characters. When I now try to reset it with the command # /usr/local/ssl/bin/openssl rsa -in server.bak -out server.key Enter pass phrase for server.bak: 21202:error:28069065:lib(40):UI_set_result:result too small:ui_lib.c:847:You must type in 4 to 4095 characters Is there an option that is set somewhere in openssl that requires the minimum 4 characters that can be turned off to allow a null passphrase? Joe DeBattista UCSF, ITS INTERNET: [EMAIL PROTECTED] __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
Re: How to create a certificate silently
On Fri, Sep 03, 2004 at 12:51:02PM -0400, Lule Chen wrote: Thanks, but I am new to openssl. Could you give me a little bit more detail of the usage? There is a good article in Septembers SysAdmin mag (if you can obtain a copy) about using expect to automate openssl operations. http://www.samag.com/current/ A good approach would be using autoexpect which could build you something quickly, then tweak it a bit so it works flawlessly. -- Some days it's just not worth chewing through the restraints... Mark D. Foster, CISSP [EMAIL PROTECTED] http://mark.foster.cc/ pgpuv0S5a7oha.pgp Description: PGP signature
Re: How to create a certificate silently
If you're using Unix or another system that supports the Environment variables, you can write a fixed openssl conf file that references appropriate variables in appropriate places. If you don't have Environment you can still write a custom openssl conf file for each instance of signing. Lule Chen wrote: Hi, I use the openssl to create a self signed certificate, but it needs interactively input country name, province name, ... Common name. I am wondering if there is a way to do it silently, i.e. let it read those response from a configure file? Because I want to run the openssl command in a script and don't want user to input any thing. I badly need your help! Thanks, Louis -- Charles B (Ben) Cranston mailto: [EMAIL PROTECTED] http://www.wam.umd.edu/~zben __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
Re: Removing passphrase for Apache server
I have Apache 2.50.0 with the mod_ssl enabled on an AIX 5.1 machine. I compiled openssl-0.9.7d with the gcc compiler. When I first installed the key, I wanted to create it with no passphrase, but it said I needed a minimum of 4 characters. When I now try to reset it with the command # /usr/local/ssl/bin/openssl rsa -in server.bak -out server.key Enter pass phrase for server.bak: 21202:error:28069065:lib(40):UI_set_result:result too small:ui_lib.c:847:You must type in 4 to 4095 characters Is there an option that is set somewhere in openssl that requires the minimum 4 characters that can be turned off to allow a null passphrase? Add -nodes = openssl -in keywithpass.pem -out keynopass.pem -nodes Oliver smime.p7s Description: S/MIME Cryptographic Signature
RE: How to create a certificate silently
Title: RE: How to create a certificate silently Thanks, Lule -Original Message- From: Mark Foster [mailto:[EMAIL PROTECTED]] Sent: Friday, September 03, 2004 2:55 PM To: [EMAIL PROTECTED] Subject: Re: How to create a certificate silently On Fri, Sep 03, 2004 at 12:51:02PM -0400, Lule Chen wrote: Thanks, but I am new to openssl. Could you give me a little bit more detail of the usage? There is a good article in Septembers SysAdmin mag (if you can obtain a copy) about using expect to automate openssl operations. http://www.samag.com/current/ A good approach would be using autoexpect which could build you something quickly, then tweak it a bit so it works flawlessly. -- Some days it's just not worth chewing through the restraints... Mark D. Foster, CISSP [EMAIL PROTECTED] http://mark.foster.cc/
RE: How to create a certificate silently
Title: RE: How to create a certificate silently Thanks, Lule -Original Message- From: Charles B Cranston [mailto:[EMAIL PROTECTED]] Sent: Friday, September 03, 2004 3:00 PM To: [EMAIL PROTECTED] Subject: Re: How to create a certificate silently If you're using Unix or another system that supports the Environment variables, you can write a fixed openssl conf file that references appropriate variables in appropriate places. If you don't have Environment you can still write a custom openssl conf file for each instance of signing. Lule Chen wrote: Hi, I use the openssl to create a self signed certificate, but it needs interactively input country name, province name, ... Common name. I am wondering if there is a way to do it silently, i.e. let it read those response from a configure file? Because I want to run the openssl command in a script and don't want user to input any thing. I badly need your help! Thanks, Louis -- Charles B (Ben) Cranston mailto: [EMAIL PROTECTED] http://www.wam.umd.edu/~zben __ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
install SSLeay
I am trying to install SSLeay and have used both the automatic link with-in Webmin and manually. I get the same failure notice either way. Attached is the install log. The errors appear in the last 5 or so lines. Anyone have any ideas how to prevent this? This install is on a HP LPR Running SUSI 8.0 600 mHrz P3hp The file below indicates that I should upgrade to openssl-0.9.7b The file I downloaded is openssl-0.9.7d.tar.gz http://www.openssl.org/source/openssl-0.9.7d.tar.gz so I'm not sure if its looking for a differant version Thanks Module Index Install Module Making and installing Net_SSLeay.pm .. Untarring module file Executing gunzip -c /tmp/.webmin/Net_SSLeay.pm-1.25.tar.gz | tar xvf - .. Net_SSLeay.pm-1.25/ Net_SSLeay.pm-1.25/ptrcasttst.c Net_SSLeay.pm-1.25/MANIFEST Net_SSLeay.pm-1.25/RECIPE.Win32 Net_SSLeay.pm-1.25/Changes Net_SSLeay.pm-1.25/Net-SSLeay-Handle-0.50/ Net_SSLeay.pm-1.25/Net-SSLeay-Handle-0.50/Makefile.PL Net_SSLeay.pm-1.25/Net-SSLeay-Handle-0.50/MANIFEST Net_SSLeay.pm-1.25/Net-SSLeay-Handle-0.50/test.pl Net_SSLeay.pm-1.25/Net-SSLeay-Handle-0.50/Handle.pm Net_SSLeay.pm-1.25/Net-SSLeay-Handle-0.50/Changes Net_SSLeay.pm-1.25/examples/ Net_SSLeay.pm-1.25/examples/get_page.pl Net_SSLeay.pm-1.25/examples/bio.pl Net_SSLeay.pm-1.25/examples/tcpcat.pl Net_SSLeay.pm-1.25/examples/makecert.pl Net_SSLeay.pm-1.25/examples/cb-testi.pl Net_SSLeay.pm-1.25/examples/ephemeral.pl Net_SSLeay.pm-1.25/examples/tcpecho.pl Net_SSLeay.pm-1.25/examples/cli-cert.pl Net_SSLeay.pm-1.25/examples/bulk.pl Net_SSLeay.pm-1.25/examples/get_page_cert.pl Net_SSLeay.pm-1.25/examples/req.conf Net_SSLeay.pm-1.25/examples/sslecho.pl Net_SSLeay.pm-1.25/examples/https-proxy-snif.pl Net_SSLeay.pm-1.25/examples/ssl_diff.pl Net_SSLeay.pm-1.25/examples/passwd-cb.pl Net_SSLeay.pm-1.25/examples/sslcat.pl Net_SSLeay.pm-1.25/examples/get_authenticated_page.pl Net_SSLeay.pm-1.25/examples/ssl-inetd-serv.pl Net_SSLeay.pm-1.25/examples/minicli.pl Net_SSLeay.pm-1.25/examples/stdio_bulk.pl Net_SSLeay.pm-1.25/examples/callback.pl Net_SSLeay.pm-1.25/examples/server_key.pem Net_SSLeay.pm-1.25/SSLeay.pm Net_SSLeay.pm-1.25/.rnd Net_SSLeay.pm-1.25/README Net_SSLeay.pm-1.25/SSLeay.xs Net_SSLeay.pm-1.25/test.pl Net_SSLeay.pm-1.25/Makefile.PL Net_SSLeay.pm-1.25/QuickRef Net_SSLeay.pm-1.25/README.Win32 Net_SSLeay.pm-1.25/ptrtstrun.pl Net_SSLeay.pm-1.25/Credits Net_SSLeay.pm-1.25/typemap Compiling module Executing /usr/bin/perl Makefile.PL make .. Checking for OpenSSL-0.9.6j or 0.9.7b or newer... openssl-0.9.6i/0.9.7a and earlier versions have security flaws or bugs, see advisories at www.openssl.org http://www.openssl.org, upgrading to openssl-0.9.6j or openssl-0.9.7b is recommended. You have OpenSSL-0.9.6c installed in /usr *** /usr/bin/openssl appears to be compiled with gcc (gcc -fPIC -DTHREADS -D_REENTRANT -DDSO_DLFCN - DHAVE_DLFCN_H -DNO_RC5 -DNO_IDEA -O2 -march=i486 -mcpu=i686 -fPIC -DL_ENDIAN -DTERMIO -O3 -fomit-fra me-pointer -m486 -Wall -DSHA1_ASM -DMD5_ASM -DRMD160_ASM ) while perl is compiled with cc. Both must be compiled with the same compiler and flags. Mixing and matching compilers is not supported. at Makefile.PL line 137. Checking if your kit is complete... Looks good Checking if your kit is complete... Looks good Writing Makefile for Net::SSLeay::Handle Writing Makefile for Net::SSLeay cp ptrtstrun.pl blib/lib/Net/ptrtstrun.pl cp SSLeay.pm blib/lib/Net/SSLeay.pm AutoSplitting blib/lib/Net/SSLeay.pm (blib/lib/auto/Net/SSLeay) blib/lib/Net/SSLeay.pm: some names are not unique when truncated to 8 characters: directory blib/lib/auto/Net/SSLeay: do_https3.al, do_https2.al, do_https4.al, do_https.al truncate to do_https do_httpx3.al, do_httpx2.al, do_httpx4.al truncate to do_httpx get_https.al, get_https3.al, get_https4.al, get_http.al, get_http3.al, get_http4.al, get_httpx.al, get_httpx3.al, get_httpx4.al truncate to get_http head_https.al, head_https3.al, head_https4.al, head_http.al, head_http3.al, head_http4.al, head_ht tpx.al, head_httpx3.al, head_httpx4.al truncate to head_htt post_https.al, post_https3.al, post_https4.al, post_http.al, post_http3.al, post_http4.al, post_ht tpx.al, post_httpx3.al, post_httpx4.al truncate to post_htt put_https.al, put_https3.al, put_https4.al, put_http.al, put_http3.al, put_http4.al, put_httpx.al, put_httpx3.al, put_httpx4.al truncate to put_http ssl_read_all.al, ssl_read_until.al, ssl_read_CRLF.al truncate to ssl_read ssl_write_all.al, ssl_write_CRLF.al truncate to ssl_writ tcp_read_all.al, tcp_read_until.al, tcp_read_CRLF.al truncate to tcp_read tcp_write_all.al, tcp_write_CRLF.al truncate to tcp_writ make[1]: Entering directory `/tmp/.webmin/Net_SSLeay.pm-1.25/Net-SSLeay-Handle-0.50' cp Handle.pm ../blib/lib/Net/SSLeay/Handle.pm Manifying ../blib/man3/Net::SSLeay::Handle.3pm make[1]: Leaving directory `/tmp/.webmin/Net_SSLeay.pm-1.25/Net-SSLeay-Handle-0.50' /usr/bin/perl -I/usr/lib/perl5/5.6.1/i586-linux -I/usr/lib/perl5/5.6.1 /usr/lib/perl5/5.6.1/ExtUtils /xsubpp -typemap