>= Original Message From [EMAIL PROTECTED] =
>> C:\Work\EudSMIME\SetngDlg.cpp(378) : error C2664: 'sk_pop_free' : cannot
>> convert parameter 2 from 'void (PKCS12_SAFEBAG *)' to 'void (__cdecl
*)(void)'
>> None of the functions with this name in scope match the target type
>>From
Hi,
I have installed openssl and openssh on three Redhat servers. Two
servers are 6.0 and one is 6.1. I used rpms from SuSE6.4
When I do a rpm -q I get the following result.
rpm -q openssh openssh-1.2.2-27
rpm -q openssl openssl-0.9.5-14
When I loaded the rpms the following message was dis
On Mon, 24 Jul 2000, ppruett wrote:
>
> FYI for list users, we to have searched long and hard
> for the steps to be a "bundled root CA"
>
...
>
> I think that it would be a good to have a section on "bundled root CA"
> for Simos' bookon openpki http://ospkibook.sourceforge.net
> If anyone
Al Sparks wrote:
>
> I'm trying to compile openssl-0.9.5a on an Alpha running Red Hat 6.1
> Linux kernel 2.2.13-0.9. It compiles fine, until I configure it to
> also compile rsaref.
I guess by now Al's figured out he has to build the RSAREF library
and copy it to something like /usr/local/lib/l
Going through the s_client.c example, I cannot find the section in which
SSL handshaking occurs. The larger question is, in which call does OpenSSL
take care of pending business?
Around line 405 the init_client() call seems to be a regular socket connect
that has nothing to do with SSL. Then t
I'm using the PKCS#7 functions to append signatures to files we're sending
over the Internet and it works fine. We're planning to do some encryption
also. The main difficulty is to uderstand and use properly these functions.
Thank god, there has always been a good support from this mailing list,
I was wondering if anyone ever used the algorithms from OpenSSL
for E-Business applications beyond plain SSL? While I see most of
the basic PK applications present in the toolkit (signing documents,
authentication, encryption, etc), I would like to hear about your
experience with the OpenSSL packa
From: "Remo Inverardi" <[EMAIL PROTECTED]>
invi> a) Is the rsaref library the same as Bsafe? Or is it a part of
invi>Bsafe?
No. RSAref is a reference implementation of the RSA algorithm. Bsafe
has a better implementation and contains more than just RSA routines.
About the rest, I'll let s
After reading about the rsaref library, several questions came to
mind:
a) Is the rsaref library the same as Bsafe? Or is it a part of
Bsafe?
b) Why is it impossible to order the Bsafe library from Switzerland?
I tried several times (also on the Australian RSA Site which seems
to redire
I didn't rename that file. I'll give that a try.
Also, I ddin't hit the send button 3 times, and in fact, your message
posted 3 times also. I noticed that when I replied to your message, I was
presented with 2 "[EMAIL PROTECTED]" in the To: field. I took
one of them out.
I'll check the heade
When I made myself a client cert to mess around with client auth, I was able
to get the issuer cert into NS4.7 by importing a pkcs12 that had my client
cert chained with the root cert.
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
> Sent: Monday, July 24, 2000
Please hit 'Send' only once... your message came in three times...
Anyway,
Did you 'install' the rsaref library ? Looks like when you are
compiling, it can't find it...
Also, did you rename 'rsaref.a' to 'librsaref.a' ?
Al Sparks wrote:
>
> I'm trying to compile openssl-0.9.5a on an Alpha
I'm trying to compile openssl-0.9.5a on an Alpha running Red Hat 6.1
Linux kernel 2.2.13-0.9. It compiles fine, until I configure it to
also compile rsaref.
When I do a make, it errors out (after about 4-5 minutes).
Here's a few lines of the last part of the output from make:
*
**
I am new in this mailing list.
A want to activate SSL communication on my Mail server [sendmail v8]
I don't know how i can do it.
__
OpenSSL Project http://www.openssl.org
Anders Östling wrote:
>
>
> When an Outlook user sends an encrypted and signed message to a Netscape
> user,
> it crashes the outlook client when he attempt to read the message. The
> MS user can
> send the same message to himself w/o problems.
>
I take it you mean that the Netscape client cra
mariano Jess wrote:
>
> Hi.
>
> I generate a s/mime with:
>
> openssl smime -sign -in texto.txt -text -out mensaje.msg -signer
> certificate.crt -inkey privatekey.key
>
> And it's all ok
>
> when a try verify this file (mensaje.msg) with:
>
> openssl smime -verify -in mensaje.msg -out signed
on being a bundled Root CA-
I suspect that a root CA will some local laws and policies
to adhere to and declare that they adhere to law/policy numbers number
such and such...
Then I suspect the web browsers writers will want a nominal setup fee
$1K + ? to review an application and a couple of
On 24 Jul 2000, Uli Koeppe asked :
> is there any such thing as a compiled openssl program win32
> for Windows 98 and/or NT, (command line version) that can
> be downloaded from somewhere in the web?
I *think* you can get what you want from http://www.opensa.de/, but it's a
while since I looke
At 04:06 AM 7/24/00, you wrote:
>You can get a trial one (e.g. at Verisign), or build your own CA
You don't need to build your own CA for a single cert, .. a CA is only required (IIUC)
to manage *client certs*.
>I think a good certificate is made of two things, trust (in the CA), and
>availabil
FYI for list users, we to have searched long and hard
for the steps to be a "bundled root CA"
No one seems to be able to give us an answer at Microsoft,
nor locate an accurate URL, guess that is no suprise.
The best we got from Netscape was this URL
http://home.netscape.com/security/caprogram/
Hi.
I generate a s/mime with:
openssl smime -sign -in texto.txt -text -out mensaje.msg -signer
certificate.crt -inkey privatekey.key
And it's all ok
when a try verify this file (mensaje.msg) with:
openssl smime -verify -in mensaje.msg -out signedtxt.txt -signer
certificate.crt
An error occur
At 07:11 AM 7/24/00, you wrote:
>1. Are there free certificates somewhere?
Yes. You can build your own (see the OpenSSL docs for creating a CSRT), .. the only
difference is that you will not have traceability to a root cert, and any users will
get the dialog boxe(s)'do you really trust this sit
On Mon, 24 Jul 2000, Michael Beaucourt wrote:
> Hi,
>
> I'm working on a Redhat Linux 6.1 system (soon 6.2) and I am relatively
> new to SSL. But I will need the technology in the near future for an
> e-commerce solution. Now, after reading some stuff I understand you need
> to buy a server
> > 1. Are there free certificates somewhere?
>
> You can get a trial one (e.g. at Verisign) or build your own CA
If building your own, your customers will need to download your homemade
CA-cert and verify its fingerprint offband somehow. This could be a
solution when having few customers coming
Hi, sorry for just popping in like that, but is there any such thing as a
compiled openssl program win32 for Windows 98 and/or NT, (command line
version) that can be downloaded from somewhere in the web? I just read the "
INSTALLATION ON THE WIN32 PLATFORM" explanation and it's looks kind of hairy
Michael Beaucourt wrote:
> Hi,
>
> I'm working on a Redhat Linux 6.1 system (soon 6.2) and I am relatively
> new to SSL. But I will need the technology in the near future for an
> e-commerce solution. Now, after reading some stuff I understand you need
> to buy a server certificate. I have visite
Angus Lee wrote:
>
> Hi,
>
> There're three sk_pop_free() calls in the dump_certs_keys_p12() function in
> the pkcs12.c program. I copied the code from dump_certs_keys_p12() function
> into my program and compiled in VC6 /w SP4 on Win98SE. VC6 reported that:
> C:\Work\EudSMIME\SetngDlg.cpp(378)
Hello,
I have two questions for those who are using
certificates :
1. Open-ssl has a directory 'certs' which seems to
contain CA certs, are those CA trusted certs which are used to autenticate
client certificates, like browsers use to autenticate server certs ?
If so, how do I add my ow
Hi,
I'm working on a Redhat Linux 6.1 system (soon 6.2) and I am relatively
new to SSL. But I will need the technology in the near future for an
e-commerce solution. Now, after reading some stuff I understand you need
to buy a server certificate. I have visited some sites like thawte.com
and
"Pablo J. Royo" wrote:
>
> I´m using this cert from Baltimore with openssl0.9.5a.
This question is for openssl-users not openssl-dev.
> I don´t know why they generate PEM certs with 76 chars in each line,
> instead of 64 as everybody does.
Should be no problem. Depends on their base64 lib.
>
From: "Pablo J. Royo" <[EMAIL PROTECTED]>
royop> So I´d like to know if there is a way to use the same b64
royop> functions to handle it, or what kind of modification should I
royop> do to bio64 or PEM routines. It would be easy?
What you want to do is hack in crypto/evp/encode.c. I've no idea
Hi
I have a certificate problem that is not really OpenSSL related, but
I'll try anyway.
I have setup an IPlanet CMS and a IPlanet LDAP server. The RA system can
create
and publish end-user certs.
When an Outlook user sends an encrypted and signed message to a Netscape
user,
it crashes the outlo
Our customers get this error very often It's not an OpenSSL problem,
but an IIS problem
If you take a look at Microsoft's site and search for "80093005", you'll
find a description of this error code, and it has nothing to do with
IIS...
Check some things:
- remove everything before the
Hi
I´m using this cert from Baltimore with openssl0.9.5a.
I don´t know why they generate PEM certs with 76 chars in each line, instead
of 64 as everybody does.If you take the cert and manually put it with 64
chars per line and the "BEGIN/END CERTIFICATE" stuff all goes well, but if
not x509 comma
I work on win NT server and I have created ca certificate and server
certificate and now I want to install it on iis but when I do it, I
obtain :
the certificate is invalid
CAPI2 error = 80093005
Does anyone has already had this error and solve it?
Thanx in advence,
audrey occello
___
Whilst investigating what can be done with X-509 certificates, it occurred
to me that maybe having separate, role-based, signing certificates for the
likes of E-Mail/SSL. So I went ahead, created my root (no problems), made
another certificate that was not a CA (but sign-only) and signed that wi
36 matches
Mail list logo