ca-fix required in openssl 0.9.3

1999-06-03 Thread GOMEZ Henri
Hi. Since openssl 0.9.3, ca-fix seems to be no more supported. Since I've got to generate CA cert and user certs (with pkcs12), I use a script modified from mca.sh found in mod_ssl. Question : How did I replace patches with ca-fix ? Thanks #!/bin/sh ## ## jmca -- mod_ssl mca modified ## ##

US paranoia...

1999-06-03 Thread Richard Levitte - VMS Whacker
I've just received the suggestion to make sure the VMS installation scripts make the executables execute-only. The corresponding on the Unixly side would be to give the binaries the protection 711 instead of 755. The reason would be that on a multiuser system, lusers wouldn't be able to copy

Re: US paranoia...

1999-06-03 Thread William M. Perry
Richard Levitte - VMS Whacker [EMAIL PROTECTED] writes: I've just received the suggestion to make sure the VMS installation scripts make the executables execute-only. The corresponding on the Unixly side would be to give the binaries the protection 711 instead of 755. The reason would be

Re: ca-fix required in openssl 0.9.3

1999-06-03 Thread Dr Stephen Henson
GOMEZ Henri wrote: Hi. Since openssl 0.9.3, ca-fix seems to be no more supported. Since I've got to generate CA cert and user certs (with pkcs12), I use a script modified from mca.sh found in mod_ssl. Question : How did I replace patches with ca-fix ? Thanks The way you have

Re: US paranoia...

1999-06-03 Thread Goetz Babin-Ebell
At 11:57 03.06.99 +0200, you wrote: I've just received the suggestion to make sure the VMS installation scripts make the executables execute-only. The corresponding on the Unixly side would be to give the binaries the protection 711 instead of 755. The reason would be that on a multiuser

Re: US paranoia...

1999-06-03 Thread Leland V. Lammert
At 06:26 AM 6/3/99 -0500, William M. Perry wrote: It would be silly to make this kind of change in the distribution. If you are lucky enough to not be in the united states, then this type of installation 'restriction' would be a hindrance. If someone in the US is so paranoid they feel these

Re: US paranoia...

1999-06-03 Thread William M. Perry
"Leland V. Lammert" [EMAIL PROTECTED] writes: At 06:26 AM 6/3/99 -0500, William M. Perry wrote: It would be silly to make this kind of change in the distribution. If you are lucky enough to not be in the united states, then this type of installation 'restriction' would be a hindrance. If

Looking for Certificate-LDAP parser

1999-06-03 Thread Lisa Lutz
I am looking for a standardize mechanism for taking information out of the Certificate Subject DN and mapping it to the User DN in an LDAP directory. I need to address the requirements of RFC 2253 which would enable the following: Certificate Subject DN: CN=Fred+UID=FSMITH, OU=QA,

Certificate - LDAP Mapping

1999-06-03 Thread Lisa Lutz
I need to map certificate Subject DNs to LDAP User DNs. I would like to be handle complex cases such as: Subject DN = CN=Fred+UID=FSMITH, OU=DEV, O=CompanyA to UserDN UID=CN=Fred+FSMITH, OU=DEV, O=CompanyA Is there a standard certificate mapping syntax that I should follow? Is there parsing

libwww AND SSL

1999-06-03 Thread matias
HI list ! I'm new developing libwww, in fact...it seems to me very dificult to learn how to programm it. Anyway... I need to use libwww in a SSL connection.but i read that it's not distributed becouse US laws. I'm living in Argentinaso i do not care US Laws ! Did somebody do this...i

question regarding d2i_TYPE()

1999-06-03 Thread Dave Clark
Hello; I'm attempting to convert a buffer containing a sequence of DER-encoded objects into a set of X509 objects. The documentation for d2i_TYPE: TYPE *d2i_TYPE(a, pp, length) TYPE **a; unsigned char **pp; long length; says that "*pp will be updated to point to *pp + length,

Re: question regarding d2i_TYPE()

1999-06-03 Thread vf
Hello; I'm attempting to convert a buffer containing a sequence of DER-encoded objects into a set of X509 objects. The documentation for d2i_TYPE: TYPE *d2i_TYPE(a, pp, length) TYPE **a; unsigned char **pp; long length; says that "*pp will be updated to point

test failure

1999-06-03 Thread Mark Crispin
OpenSSL 0.9.3 23 May 1999 built on: Thu Jun 3 16:50:42 PDT 1999 platform: nextstep options: bn(64,32) md2(int) rc4(ptr,int) des(ptr,risc1,16,long) idea(int) blowfish(idx) compiler: cc -DRSAref -O -Wall Protocol SSLv2, cipher SSLv2, DES-CBC3-MD5 test sslv3 ERROR in SERVER