Hi.
Since openssl 0.9.3, ca-fix seems to be no more supported.
Since I've got to generate CA cert and user certs (with pkcs12), I use a
script
modified from mca.sh found in mod_ssl.
Question : How did I replace patches with ca-fix ?
Thanks
#!/bin/sh
##
## jmca -- mod_ssl mca modified
##
##
I've just received the suggestion to make sure the VMS installation
scripts make the executables execute-only. The corresponding on the
Unixly side would be to give the binaries the protection 711 instead
of 755. The reason would be that on a multiuser system, lusers
wouldn't be able to copy
Richard Levitte - VMS Whacker [EMAIL PROTECTED] writes:
I've just received the suggestion to make sure the VMS installation
scripts make the executables execute-only. The corresponding on the
Unixly side would be to give the binaries the protection 711 instead
of 755. The reason would be
GOMEZ Henri wrote:
Hi.
Since openssl 0.9.3, ca-fix seems to be no more supported.
Since I've got to generate CA cert and user certs (with pkcs12), I use a
script
modified from mca.sh found in mod_ssl.
Question : How did I replace patches with ca-fix ?
Thanks
The way you have
At 11:57 03.06.99 +0200, you wrote:
I've just received the suggestion to make sure the VMS installation
scripts make the executables execute-only. The corresponding on the
Unixly side would be to give the binaries the protection 711 instead
of 755. The reason would be that on a multiuser
At 06:26 AM 6/3/99 -0500, William M. Perry wrote:
It would be silly to make this kind of change in the distribution. If you
are lucky enough to not be in the united states, then this type of
installation 'restriction' would be a hindrance. If someone in the US is
so paranoid they feel these
"Leland V. Lammert" [EMAIL PROTECTED] writes:
At 06:26 AM 6/3/99 -0500, William M. Perry wrote:
It would be silly to make this kind of change in the distribution. If you
are lucky enough to not be in the united states, then this type of
installation 'restriction' would be a hindrance. If
I am looking for a standardize mechanism for taking information out of the
Certificate Subject DN and mapping it to the User DN in an LDAP directory.
I need to address the requirements of RFC 2253 which would enable the
following:
Certificate Subject DN:
CN=Fred+UID=FSMITH, OU=QA,
I need to map certificate Subject DNs to LDAP User DNs. I would like to be
handle complex cases such as:
Subject DN = CN=Fred+UID=FSMITH, OU=DEV, O=CompanyA
to
UserDN UID=CN=Fred+FSMITH, OU=DEV, O=CompanyA
Is there a standard certificate mapping syntax that I should follow? Is
there parsing
HI list !
I'm new developing libwww, in fact...it seems to me very dificult to
learn how to programm it.
Anyway...
I need to use libwww in a SSL connection.but i read that it's not
distributed becouse US laws.
I'm living in Argentinaso i do not care US Laws !
Did somebody do this...i
Hello;
I'm attempting to convert a buffer containing a sequence of
DER-encoded objects into a set of X509 objects.
The documentation for d2i_TYPE:
TYPE *d2i_TYPE(a, pp, length)
TYPE **a;
unsigned char **pp;
long length;
says that "*pp will be updated to point to *pp + length,
Hello;
I'm attempting to convert a buffer containing a sequence of
DER-encoded objects into a set of X509 objects.
The documentation for d2i_TYPE:
TYPE *d2i_TYPE(a, pp, length)
TYPE **a;
unsigned char **pp;
long length;
says that "*pp will be updated to point
OpenSSL 0.9.3 23 May 1999
built on: Thu Jun 3 16:50:42 PDT 1999
platform: nextstep
options: bn(64,32) md2(int) rc4(ptr,int) des(ptr,risc1,16,long) idea(int)
blowfish(idx)
compiler: cc -DRSAref -O -Wall
Protocol SSLv2, cipher SSLv2, DES-CBC3-MD5
test sslv3
ERROR in SERVER
13 matches
Mail list logo