Re: Few general questions

2004-09-03 Thread Sylvain MARECHAL
Edward Chan a écrit:
So to use native windows async i/o, I need to do the I/O myself (using bio
pairs).  Then I assume there is an easy way to figure out the ciphers and
things agreed upon during the ssl handshake?  Is this stuff readily
available in the SSL object?  At the risk of sounding lazy, what API's do I
need to use to determine this info? :)
Thanks,
Ed
There is an example using BIO_pair in the ssl directory, ssltest.c
I think it can be a good entry point.
Sylvain

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


Signed PKCS#7 without a certificate included ?

2004-09-03 Thread Hellan.Kim KHE
Hi

I'm trying to make a signed and encrypted PKCS#7 message with a footprint as small as 
possible.
So my (probably dumb) question is: Is it possible not to include signers certificate 
in the PKCS#7 ?
The PKCS7_Sign() function does not seem to allow it.

When the receiver wants to verify the signature, he then of course has to supply 
signers certificate himself somehow, in order to perform the verification.

Med venlig hilsen / Best regards

Kim Hellan





___
www.kmd.dk   www.kundenet.kmd.dk   www.eboks.dk   www.civitas.dk   www.netborger.dk

Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og 
sletter den.
KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og 
borgerne.

If you received this e-mail by mistake, please notify me and delete it. Thank you.
Our mission is to enhance the efficiency of the public sector and improve its service 
of the general public. 

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


Re: Signed PKCS#7 without a certificate included ?

2004-09-03 Thread Marco Roeland
On Friday September 3rd 2004 Hellan.Kim KHE wrote:

 I'm trying to make a signed and encrypted PKCS#7 message with a
 footprint as small as possible. So my (probably dumb) question is: Is
 it possible not to include signers certificate in the PKCS#7 ? The
 PKCS7_Sign() function does not seem to allow it.
 
PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
BIO *data, int flags);

Use PKCS7_NOCERTS in the 'flags' argument.

 When the receiver wants to verify the signature, he then of course has
 to supply signers certificate himself somehow, in order to perform the
 verification.

Yes.
-- 
Marco Roeland
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


SV: Signed PKCS#7 without a certificate included ?

2004-09-03 Thread Hellan.Kim KHE
Hi,

If I use the PKCS7_NOCERTS flag and use NULL in the signcert argument, I still get 
access violations.
The problem is in x509_cmp.c file in the X509_check_private_key() function.
The lines say:

int X509_check_private_key(X509 *x, EVP_PKEY *k)
{
EVP_PKEY *xk=NULL;
int ok=0;

xk=X509_get_pubkey(x);
if (xk-type != k-type)

since x is NULL, then xk is also NULL, so the if line crashes the application.

Any other ideas ?

Thanks,
Kim


-Oprindelig meddelelse-
Fra: Marco Roeland [mailto:[EMAIL PROTECTED] vegne af Marco Roeland
Sendt: 3. september 2004 11:16
Til: [EMAIL PROTECTED]
Cc: Hellan.Kim KHE
Emne: Re: Signed PKCS#7 without a certificate included ?


On Friday September 3rd 2004 Hellan.Kim KHE wrote:

 I'm trying to make a signed and encrypted PKCS#7 message with a
 footprint as small as possible. So my (probably dumb) question is: Is
 it possible not to include signers certificate in the PKCS#7 ? The
 PKCS7_Sign() function does not seem to allow it.
 
PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
BIO *data, int flags);

Use PKCS7_NOCERTS in the 'flags' argument.

 When the receiver wants to verify the signature, he then of course has
 to supply signers certificate himself somehow, in order to perform the
 verification.

Yes.
-- 
Marco Roeland




___
www.kmd.dk   www.kundenet.kmd.dk   www.eboks.dk   www.civitas.dk   www.netborger.dk

Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og 
sletter den.
KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og 
borgerne.

If you received this e-mail by mistake, please notify me and delete it. Thank you.
Our mission is to enhance the efficiency of the public sector and improve its service 
of the general public. 

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


SV: Signed PKCS#7 without a certificate included ?

2004-09-03 Thread Hellan.Kim KHE
Disregard the last mail.
You, of course, must still supply a signer certificate, it's just not included in the 
PKCS#7.

Sorry!

/Kim

-Oprindelig meddelelse-
Fra: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] vegne af Hellan.Kim KHE
Sendt: 3. september 2004 12:35
Til: Marco Roeland; [EMAIL PROTECTED]
Emne: SV: Signed PKCS#7 without a certificate included ?


Hi,

If I use the PKCS7_NOCERTS flag and use NULL in the signcert argument, I still get 
access violations.
The problem is in x509_cmp.c file in the X509_check_private_key() function.
The lines say:

int X509_check_private_key(X509 *x, EVP_PKEY *k)
{
EVP_PKEY *xk=NULL;
int ok=0;

xk=X509_get_pubkey(x);
if (xk-type != k-type)

since x is NULL, then xk is also NULL, so the if line crashes the application.

Any other ideas ?

Thanks,
Kim


-Oprindelig meddelelse-
Fra: Marco Roeland [mailto:[EMAIL PROTECTED] vegne af Marco Roeland
Sendt: 3. september 2004 11:16
Til: [EMAIL PROTECTED]
Cc: Hellan.Kim KHE
Emne: Re: Signed PKCS#7 without a certificate included ?


On Friday September 3rd 2004 Hellan.Kim KHE wrote:

 I'm trying to make a signed and encrypted PKCS#7 message with a
 footprint as small as possible. So my (probably dumb) question is: Is
 it possible not to include signers certificate in the PKCS#7 ? The
 PKCS7_Sign() function does not seem to allow it.
 
PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
BIO *data, int flags);

Use PKCS7_NOCERTS in the 'flags' argument.

 When the receiver wants to verify the signature, he then of course has
 to supply signers certificate himself somehow, in order to perform the
 verification.

Yes.
-- 
Marco Roeland




___
www.kmd.dk   www.kundenet.kmd.dk   www.eboks.dk   www.civitas.dk   www.netborger.dk

Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og 
sletter den.
KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og 
borgerne.

If you received this e-mail by mistake, please notify me and delete it. Thank you.
Our mission is to enhance the efficiency of the public sector and improve its service 
of the general public. 

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]




___
www.kmd.dk   www.kundenet.kmd.dk   www.eboks.dk   www.civitas.dk   www.netborger.dk

Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og 
sletter den.
KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og 
borgerne.

If you received this e-mail by mistake, please notify me and delete it. Thank you.
Our mission is to enhance the efficiency of the public sector and improve its service 
of the general public. 





___
www.kmd.dk   www.kundenet.kmd.dk   www.eboks.dk   www.civitas.dk   www.netborger.dk

Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og 
sletter den.
KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og 
borgerne.

If you received this e-mail by mistake, please notify me and delete it. Thank you.
Our mission is to enhance the efficiency of the public sector and improve its service 
of the general public. 

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


SV: Signed PKCS#7 without a certificate included ?

2004-09-03 Thread Hellan.Kim KHE
Hi again

In the other end I normally use PKCS7_verify() in order to verify the signature and 
get the signed text.
This function also fails since there is no signer certificate in the PKCS#7.

Do you know how to handle signature verification and text retrieval in the receiver 
end ?

Any help much appreciated!

/Kim

-Oprindelig meddelelse-
Fra: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] vegne af Hellan.Kim KHE
Sendt: 3. september 2004 12:42
Til: [EMAIL PROTECTED]; Marco Roeland
Emne: SV: Signed PKCS#7 without a certificate included ?


Disregard the last mail.
You, of course, must still supply a signer certificate, it's just not included in the 
PKCS#7.

Sorry!

/Kim

-Oprindelig meddelelse-
Fra: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] vegne af Hellan.Kim KHE
Sendt: 3. september 2004 12:35
Til: Marco Roeland; [EMAIL PROTECTED]
Emne: SV: Signed PKCS#7 without a certificate included ?


Hi,

If I use the PKCS7_NOCERTS flag and use NULL in the signcert argument, I still get 
access violations.
The problem is in x509_cmp.c file in the X509_check_private_key() function.
The lines say:

int X509_check_private_key(X509 *x, EVP_PKEY *k)
{
EVP_PKEY *xk=NULL;
int ok=0;

xk=X509_get_pubkey(x);
if (xk-type != k-type)

since x is NULL, then xk is also NULL, so the if line crashes the application.

Any other ideas ?

Thanks,
Kim


-Oprindelig meddelelse-
Fra: Marco Roeland [mailto:[EMAIL PROTECTED] vegne af Marco Roeland
Sendt: 3. september 2004 11:16
Til: [EMAIL PROTECTED]
Cc: Hellan.Kim KHE
Emne: Re: Signed PKCS#7 without a certificate included ?


On Friday September 3rd 2004 Hellan.Kim KHE wrote:

 I'm trying to make a signed and encrypted PKCS#7 message with a
 footprint as small as possible. So my (probably dumb) question is: Is
 it possible not to include signers certificate in the PKCS#7 ? The
 PKCS7_Sign() function does not seem to allow it.
 
PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
BIO *data, int flags);

Use PKCS7_NOCERTS in the 'flags' argument.

 When the receiver wants to verify the signature, he then of course has
 to supply signers certificate himself somehow, in order to perform the
 verification.

Yes.
-- 
Marco Roeland




___
www.kmd.dk   www.kundenet.kmd.dk   www.eboks.dk   www.civitas.dk   www.netborger.dk

Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og 
sletter den.
KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og 
borgerne.

If you received this e-mail by mistake, please notify me and delete it. Thank you.
Our mission is to enhance the efficiency of the public sector and improve its service 
of the general public. 

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]




___
www.kmd.dk   www.kundenet.kmd.dk   www.eboks.dk   www.civitas.dk   www.netborger.dk

Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og 
sletter den.
KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og 
borgerne.

If you received this e-mail by mistake, please notify me and delete it. Thank you.
Our mission is to enhance the efficiency of the public sector and improve its service 
of the general public. 





___
www.kmd.dk   www.kundenet.kmd.dk   www.eboks.dk   www.civitas.dk   www.netborger.dk

Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og 
sletter den.
KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og 
borgerne.

If you received this e-mail by mistake, please notify me and delete it. Thank you.
Our mission is to enhance the efficiency of the public sector and improve its service 
of the general public. 

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]




___
www.kmd.dk   www.kundenet.kmd.dk   www.eboks.dk   www.civitas.dk   www.netborger.dk

Hvis du har modtaget denne mail ved en fejl vil jeg gerne, at du informerer mig og 
sletter den.
KMD skaber it-services, der fremmer effektivitet hos det offentlige, erhvervslivet og 
borgerne.

If you received this e-mail by mistake, please notify me and delete it. Thank you.
Our mission is to enhance the efficiency of the public sector and improve its service 

Re: SV: Signed PKCS#7 without a certificate included ?

2004-09-03 Thread Marco Roeland
On Friday September 3rd 2004 Hellan.Kim KHE wrote:

 You, of course, must still supply a signer certificate, it's just not
 included in the PKCS#7.

Correct.
 
 Sorry!

Heh, no problem! OpenSSL is great, but it does take some time to learn!
Once you get over that it's very powerful and flexible.
-- 
Marco Roeland
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


SSL Handshake custom implementation

2004-09-03 Thread Amit Sharma
Greetings,

I am interested in a rough  quick experiment with the SSL handshake
process. My idea is to custom create the handshake layer in SSL with my
own version of SSL handshake, keeping everything else intact in the SSL
protocol. I am wondering if I can use some library/command line (such
as, openssl) that shall allow me to tweak around the SSL handshake
instead of rewriting the complete protocol. Any documentation on the
implementation of the SSL handshake will also be quite useful.

Any ideas?

Thanx in advance,
Gracias,
Amit

PS. I am relatively new to openssl. Incase therez some pre-requisite to
do so using openssl, please advice.


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


read certificate

2004-09-03 Thread Niklas Olsson
Hi,
If I have a certificate in a buffer (get it via TLS connection)
Right now I use CryptoAPI and CryptEncrypt to read the public key and 
encrypt my key( the pre msaterkey) with it.

What would I do in OpenSSL to achive the same thing? any example?
regards
Niklas
_
Hitta rätt på nätet med MSN Sök http://search.msn.se/
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


How to create a certificate silently

2004-09-03 Thread Lule Chen
Title: How to create a certificate silently





Hi, I use the openssl to create a self signed certificate, but it needs interactively input country name, province name, ... Common name. I am wondering if there is a way to do it silently, i.e. let it read those response from a configure file? Because I want to run the openssl command in a script and don't want user to input any thing. I badly need your help!


Thanks,



Louis





OpenSSL and CMS

2004-09-03 Thread Antonio Ruiz Martínez
Hello!
   I'm writing you because I would like to know if Opessl is planning 
to support the Cryptographic Message Syntax (CMS) for the PKCS#7, and in 
that case, when it could be possible to be available.

Thanks for your answers,
Regards,
Antonio.
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


Re: How to create a certificate silently

2004-09-03 Thread Mark Foster
On Fri, Sep 03, 2004 at 11:19:37AM -0400, Lule Chen wrote:
 Hi, I use the openssl to create a self signed certificate, but it needs
 interactively input country name, province name, ... Common name. I am
 wondering if there is a way to do it silently, i.e. let it read those
 response from a configure file? Because I want to run the openssl command in
 a script and don't want user to input any thing. I badly need your help!

Use Expect.
-- 
Some days it's just not worth chewing through the restraints...
Mark D. Foster, CISSP [EMAIL PROTECTED]  http://mark.foster.cc/



pgpPuZVqnIYd5.pgp
Description: PGP signature


RE: How to create a certificate silently

2004-09-03 Thread Lule Chen
Title: RE: How to create a certificate silently





Thanks, but I am new to openssl. Could you give me a little bit more detail of the usage?



Lule


-Original Message-
From: Mark Foster [mailto:[EMAIL PROTECTED]] 
Sent: Friday, September 03, 2004 12:39 PM
To: [EMAIL PROTECTED]
Subject: Re: How to create a certificate silently



On Fri, Sep 03, 2004 at 11:19:37AM -0400, Lule Chen wrote:
 Hi, I use the openssl to create a self signed certificate, but it 
 needs interactively input country name, province name, ... Common 
 name. I am wondering if there is a way to do it silently, i.e. let it 
 read those response from a configure file? Because I want to run the 
 openssl command in a script and don't want user to input any thing. I 
 badly need your help!


Use Expect.
-- 
Some days it's just not worth chewing through the restraints... Mark D. Foster, CISSP [EMAIL PROTECTED] http://mark.foster.cc/




Changing md5WithRSAEncryption Sig Alg to SHA1?

2004-09-03 Thread cipherbk
CSRs are generated with MD5 as the default signature algorithm.  I'd
like to use SHA1 instead of MD5.  I've searched around (Google,
openssl-users archives) but haven't found anything.  Manpages don't
mention anything regarding changing it.  Please advise on how to
accomplish this.

Thanks,

C



__
Do you Yahoo!?
Take Yahoo! Mail with you! Get it on your mobile phone.
http://mobile.yahoo.com/maildemo 
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


Removing passphrase for Apache server

2004-09-03 Thread Joe DeBattista
Hi,
   I have Apache 2.50.0 with the mod_ssl enabled on an AIX 5.1
machine. I compiled openssl-0.9.7d with the gcc compiler.  When I first
installed the key, I wanted to create it with no passphrase, but it said I
needed a minimum of 4 characters.  When I now try to reset it with the command

# /usr/local/ssl/bin/openssl rsa -in server.bak -out server.key
Enter pass phrase for server.bak:
21202:error:28069065:lib(40):UI_set_result:result too small:ui_lib.c:847:You
must type in 4 to 4095 characters

Is there an option that is set somewhere in openssl that requires the minimum 4
characters that can be turned off to allow a null passphrase?


 Joe DeBattista
 UCSF, ITS
  INTERNET:  [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


Re: How to create a certificate silently

2004-09-03 Thread Mark Foster
On Fri, Sep 03, 2004 at 12:51:02PM -0400, Lule Chen wrote:
 Thanks, but I am new to openssl. Could you give me a little bit more detail
 of the usage?
There is a good article in Septembers SysAdmin mag (if you can obtain a copy)
about using expect  to automate openssl operations.
http://www.samag.com/current/

A good approach would be using autoexpect which could build you something
quickly, then tweak it a bit so it works flawlessly.
-- 
Some days it's just not worth chewing through the restraints...
Mark D. Foster, CISSP [EMAIL PROTECTED]  http://mark.foster.cc/



pgpuv0S5a7oha.pgp
Description: PGP signature


Re: How to create a certificate silently

2004-09-03 Thread Charles B Cranston
If you're using Unix or another system that supports the
Environment variables, you can write a fixed openssl conf
file that references appropriate variables in appropriate
places.  If you don't have Environment you can still write
a custom openssl conf file for each instance of signing.
Lule Chen wrote:
Hi, I use the openssl to create a self signed certificate, but it needs
interactively input country name, province name, ... Common name. I am
wondering if there is a way to do it silently, i.e. let it read those
response from a configure file? Because I want to run the openssl command in
a script and don't want user to input any thing. I badly need your help!
Thanks,
Louis

--
Charles B (Ben) Cranston
mailto: [EMAIL PROTECTED]
http://www.wam.umd.edu/~zben
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


Re: Removing passphrase for Apache server

2004-09-03 Thread Oliver Welter
   I have Apache 2.50.0 with the mod_ssl enabled on an AIX 5.1
machine. I compiled openssl-0.9.7d with the gcc compiler.  When I first
installed the key, I wanted to create it with no passphrase, but it said I
needed a minimum of 4 characters.  When I now try to reset it with the command
# /usr/local/ssl/bin/openssl rsa -in server.bak -out server.key
Enter pass phrase for server.bak:
21202:error:28069065:lib(40):UI_set_result:result too small:ui_lib.c:847:You
must type in 4 to 4095 characters
Is there an option that is set somewhere in openssl that requires the minimum 4
characters that can be turned off to allow a null passphrase?
Add -nodes =
openssl -in keywithpass.pem -out keynopass.pem -nodes
Oliver


smime.p7s
Description: S/MIME Cryptographic Signature


RE: How to create a certificate silently

2004-09-03 Thread Lule Chen
Title: RE: How to create a certificate silently





Thanks,


Lule


-Original Message-
From: Mark Foster [mailto:[EMAIL PROTECTED]] 
Sent: Friday, September 03, 2004 2:55 PM
To: [EMAIL PROTECTED]
Subject: Re: How to create a certificate silently



On Fri, Sep 03, 2004 at 12:51:02PM -0400, Lule Chen wrote:
 Thanks, but I am new to openssl. Could you give me a little bit more 
 detail of the usage?
There is a good article in Septembers SysAdmin mag (if you can obtain a copy) about using expect to automate openssl operations. http://www.samag.com/current/

A good approach would be using autoexpect which could build you something quickly, then tweak it a bit so it works flawlessly.

-- 
Some days it's just not worth chewing through the restraints... Mark D. Foster, CISSP [EMAIL PROTECTED] http://mark.foster.cc/




RE: How to create a certificate silently

2004-09-03 Thread Lule Chen
Title: RE: How to create a certificate silently





Thanks,


Lule


-Original Message-
From: Charles B Cranston [mailto:[EMAIL PROTECTED]] 
Sent: Friday, September 03, 2004 3:00 PM
To: [EMAIL PROTECTED]
Subject: Re: How to create a certificate silently



If you're using Unix or another system that supports the Environment variables, you can write a fixed openssl conf file that references appropriate variables in appropriate places. If you don't have Environment you can still write a custom openssl conf file for each instance of signing.

Lule Chen wrote:


 Hi, I use the openssl to create a self signed certificate, but it 
 needs interactively input country name, province name, ... Common 
 name. I am wondering if there is a way to do it silently, i.e. let it 
 read those response from a configure file? Because I want to run the 
 openssl command in a script and don't want user to input any thing. I 
 badly need your help!
 
 
 Thanks,
 
 
 Louis
 
 


-- 
Charles B (Ben) Cranston
mailto: [EMAIL PROTECTED]
http://www.wam.umd.edu/~zben


__
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]





install SSLeay

2004-09-03 Thread Ted Hussey
I am trying to install SSLeay and have used both the automatic link 
with-in Webmin and manually. I get the same failure notice either way. 
Attached is the install log. The errors appear in the last 5 or so 
lines. Anyone have any ideas how to prevent this?
This install is on a HP LPR Running SUSI 8.0 600 mHrz P3hp
The file below indicates that I should upgrade to openssl-0.9.7b The 
file I downloaded is openssl-0.9.7d.tar.gz 
http://www.openssl.org/source/openssl-0.9.7d.tar.gz  so I'm not sure 
if its looking for a differant  version

Thanks
Module Index

Install Module
Making and installing Net_SSLeay.pm ..
Untarring module file
Executing gunzip -c /tmp/.webmin/Net_SSLeay.pm-1.25.tar.gz | tar xvf - ..
Net_SSLeay.pm-1.25/
Net_SSLeay.pm-1.25/ptrcasttst.c
Net_SSLeay.pm-1.25/MANIFEST
Net_SSLeay.pm-1.25/RECIPE.Win32
Net_SSLeay.pm-1.25/Changes
Net_SSLeay.pm-1.25/Net-SSLeay-Handle-0.50/
Net_SSLeay.pm-1.25/Net-SSLeay-Handle-0.50/Makefile.PL
Net_SSLeay.pm-1.25/Net-SSLeay-Handle-0.50/MANIFEST
Net_SSLeay.pm-1.25/Net-SSLeay-Handle-0.50/test.pl
Net_SSLeay.pm-1.25/Net-SSLeay-Handle-0.50/Handle.pm
Net_SSLeay.pm-1.25/Net-SSLeay-Handle-0.50/Changes
Net_SSLeay.pm-1.25/examples/
Net_SSLeay.pm-1.25/examples/get_page.pl
Net_SSLeay.pm-1.25/examples/bio.pl
Net_SSLeay.pm-1.25/examples/tcpcat.pl
Net_SSLeay.pm-1.25/examples/makecert.pl
Net_SSLeay.pm-1.25/examples/cb-testi.pl
Net_SSLeay.pm-1.25/examples/ephemeral.pl
Net_SSLeay.pm-1.25/examples/tcpecho.pl
Net_SSLeay.pm-1.25/examples/cli-cert.pl
Net_SSLeay.pm-1.25/examples/bulk.pl
Net_SSLeay.pm-1.25/examples/get_page_cert.pl
Net_SSLeay.pm-1.25/examples/req.conf
Net_SSLeay.pm-1.25/examples/sslecho.pl
Net_SSLeay.pm-1.25/examples/https-proxy-snif.pl
Net_SSLeay.pm-1.25/examples/ssl_diff.pl
Net_SSLeay.pm-1.25/examples/passwd-cb.pl
Net_SSLeay.pm-1.25/examples/sslcat.pl
Net_SSLeay.pm-1.25/examples/get_authenticated_page.pl
Net_SSLeay.pm-1.25/examples/ssl-inetd-serv.pl
Net_SSLeay.pm-1.25/examples/minicli.pl
Net_SSLeay.pm-1.25/examples/stdio_bulk.pl
Net_SSLeay.pm-1.25/examples/callback.pl
Net_SSLeay.pm-1.25/examples/server_key.pem
Net_SSLeay.pm-1.25/SSLeay.pm
Net_SSLeay.pm-1.25/.rnd
Net_SSLeay.pm-1.25/README
Net_SSLeay.pm-1.25/SSLeay.xs
Net_SSLeay.pm-1.25/test.pl
Net_SSLeay.pm-1.25/Makefile.PL
Net_SSLeay.pm-1.25/QuickRef
Net_SSLeay.pm-1.25/README.Win32
Net_SSLeay.pm-1.25/ptrtstrun.pl
Net_SSLeay.pm-1.25/Credits
Net_SSLeay.pm-1.25/typemap
Compiling module
Executing /usr/bin/perl Makefile.PL  make ..
Checking for OpenSSL-0.9.6j or 0.9.7b or newer...
openssl-0.9.6i/0.9.7a and earlier versions have security flaws or bugs,
see advisories at www.openssl.org http://www.openssl.org, upgrading to 
openssl-0.9.6j
or openssl-0.9.7b is recommended.
You have OpenSSL-0.9.6c installed in /usr
*** /usr/bin/openssl appears to be compiled with gcc (gcc -fPIC 
-DTHREADS -D_REENTRANT -DDSO_DLFCN -
DHAVE_DLFCN_H -DNO_RC5 -DNO_IDEA -O2 -march=i486 -mcpu=i686 -fPIC 
-DL_ENDIAN -DTERMIO -O3 -fomit-fra
me-pointer -m486 -Wall -DSHA1_ASM -DMD5_ASM -DRMD160_ASM
) while perl is compiled with cc. Both must be compiled with the same 
compiler and flags. Mixing and
matching compilers is not supported. at Makefile.PL line 137.
Checking if your kit is complete...
Looks good
Checking if your kit is complete...
Looks good
Writing Makefile for Net::SSLeay::Handle
Writing Makefile for Net::SSLeay
cp ptrtstrun.pl blib/lib/Net/ptrtstrun.pl
cp SSLeay.pm blib/lib/Net/SSLeay.pm
AutoSplitting blib/lib/Net/SSLeay.pm (blib/lib/auto/Net/SSLeay)
blib/lib/Net/SSLeay.pm: some names are not unique when truncated to 8 
characters:
directory blib/lib/auto/Net/SSLeay:
do_https3.al, do_https2.al, do_https4.al, do_https.al truncate to do_https
do_httpx3.al, do_httpx2.al, do_httpx4.al truncate to do_httpx
get_https.al, get_https3.al, get_https4.al, get_http.al, get_http3.al, 
get_http4.al, get_httpx.al,
get_httpx3.al, get_httpx4.al truncate to get_http
head_https.al, head_https3.al, head_https4.al, head_http.al, 
head_http3.al, head_http4.al, head_ht
tpx.al, head_httpx3.al, head_httpx4.al truncate to head_htt
post_https.al, post_https3.al, post_https4.al, post_http.al, 
post_http3.al, post_http4.al, post_ht
tpx.al, post_httpx3.al, post_httpx4.al truncate to post_htt
put_https.al, put_https3.al, put_https4.al, put_http.al, put_http3.al, 
put_http4.al, put_httpx.al,
put_httpx3.al, put_httpx4.al truncate to put_http
ssl_read_all.al, ssl_read_until.al, ssl_read_CRLF.al truncate to ssl_read
ssl_write_all.al, ssl_write_CRLF.al truncate to ssl_writ
tcp_read_all.al, tcp_read_until.al, tcp_read_CRLF.al truncate to tcp_read
tcp_write_all.al, tcp_write_CRLF.al truncate to tcp_writ
make[1]: Entering directory 
`/tmp/.webmin/Net_SSLeay.pm-1.25/Net-SSLeay-Handle-0.50'
cp Handle.pm ../blib/lib/Net/SSLeay/Handle.pm
Manifying ../blib/man3/Net::SSLeay::Handle.3pm
make[1]: Leaving directory 
`/tmp/.webmin/Net_SSLeay.pm-1.25/Net-SSLeay-Handle-0.50'
/usr/bin/perl -I/usr/lib/perl5/5.6.1/i586-linux -I/usr/lib/perl5/5.6.1 
/usr/lib/perl5/5.6.1/ExtUtils
/xsubpp -typemap