答复: RSA pri key storage format

2000-09-11 Thread 李武
no default format. if you use openssl, pem is default.It is DER encode of you private key, then base64 it. with addtion alogorithm information, it became .pem file. PKCS is another format to store one' s certificate of private key or crl. Not strange, often used by IE, Netscape. It can jus

Re: ??: RSA pri key storage format

2000-09-11 Thread zhu qun-ying
?? wrote: > > no default format. > if you use openssl, pem is default.It is DER encode of you private key, then >base64 it. with addtion alogorithm information, it became .pem file. > PKCS is another format to store one' s certificate of private key or crl. Not >strange, often used by I

RE: Caching SSL Sessions

2000-09-11 Thread Wirta, Ville
I'd also be VERY interested of this session-cache-thing but I've allready seen two different (as I understood) ways to accomplish this and I'm confused. I wonder if there is a "session-how-to" somewhere or a simple example. I'd also like to know if it is a must to be able to touch the client code.

RE: Caching SSL Sessions

2000-09-11 Thread Phil Shattky
There is a note (written by EAY) on sessions (with code fragments) amongst the original SSLeay documents. Cheers Phil On 11-Sep-00 Wirta, Ville wrote: > I'd also be VERY interested of this session-cache-thing but I've allready > seen two different (as I understood) ways to accomplish this and I'm

Re: Caching SSL Sessions

2000-09-11 Thread Lutz Jaenicke
On Mon, Sep 11, 2000 at 12:18:04PM +0300, Wirta, Ville wrote: > I'd also be VERY interested of this session-cache-thing but I've allready > seen two different (as I understood) ways to accomplish this and I'm > confused. I wonder if there is a "session-how-to" somewhere or a simple > example. I'd

Re: Compile errors Win32

2000-09-11 Thread ukoeppe
Here is the complete error message that was missing in my earlier post. OS is Windows 98, compiler Borland 5.5 bcc32 -otmp32\rand_win.obj -Iinc32 -Itmp32 -DWIN32_LEAN_AND_MEAN -q -w-a us -w-par -w-inl -c -tWC -tWM -DWINDOWS -DWIN32 -DL_ENDIAN -O2 -ff -fp -c .\cry pto\rand\rand_win.c .\crypto

Re: Caching SSL Sessions

2000-09-11 Thread Amit Chopra
Netscape and IE both cache sessions and the server you are writing should as well. I believe most sane browsers would do the same. Unless you are writing your own client, you really don't have to worry about client-side caching. Let's say your server caches sessions. If the browser doesn't re-u

Re: Compile errors Win32

2000-09-11 Thread Richard Levitte - VMS Whacker
From: "ukoeppe" <[EMAIL PROTECTED]> ukoeppe> Warning W8075 .\crypto\rand\rand_win.c 239: Suspicious pointer conversion in function RAND_poll Ah, I think I see. Could you try the following change (do you understand the format used?)? diff -u -r1.6 rand_win.c --- crypto/rand/rand_win.c 200

RE: Caching SSL Sessions

2000-09-11 Thread Wirta, Ville
Netscape and IE both cache sessions and the server you are writing should as well. I believe most sane browsers would do the same. Unless you are writing your own client, you really don't have to worry about client-side caching. Let's say your server caches sessions. If the browser doesn't re-u

Re: Caching SSL Sessions

2000-09-11 Thread Lutz Jaenicke
On Mon, Sep 11, 2000 at 02:49:24PM +0300, Wirta, Ville wrote: > Netscape and IE both cache sessions and the server you are writing > should as well. I believe most sane browsers would do the same. > Unless you are writing your own client, you really don't have to worry > about client-side cachin

Re: Compile errors Win32

2000-09-11 Thread ukoeppe
From: Richard Levitte - VMS Whacker <[EMAIL PROTECTED]> > Ah, I think I see. Could you try the following change (do you > understand the format used?)? > > diff -u -r1.6 rand_win.c > --- crypto/rand/rand_win.c 2000/07/21 02:14:15 1.6 > +++ crypto/rand/rand_win.c 2000/09/11 11:41:16 > @@ -236,7 +2

Re: Making OpenSSL trust my own CA

2000-09-11 Thread Charles Walker
Thanks - it worked. I hacked libwww to call SSL_CTX_load_verify_locations. Regards, Charles Walker Vadim Fedukovich wrote: > > On Sat, 9 Sep 2000, Charles Walker wrote: > > > I have written some client code which uses OpenSSL plus libwww to > > retrieve files from a server. In the environmen

Re: Compile errors Win32

2000-09-11 Thread Richard Levitte - VMS Whacker
From: "ukoeppe" <[EMAIL PROTECTED]> ukoeppe> No, I don't have assembler installed. Looks like you have to. There's a few lines of assembler in rand_win.c that you can't do without at this time. Perhaps we should simply turn off readtimer for Borland C? ukoeppe> Now the error looks somewhat di

Re: Compile errors Win32

2000-09-11 Thread ukoeppe
Just tried it with the update from the Openssl CVS web interface . same thing U.K. - Original Message - From: Richard Levitte - VMS Whacker <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Monday, September 11, 2000 1:42 PM Subject: Re: Compile errors Win32 > F

Re: Caching SSL Sessions

2000-09-11 Thread Amit Chopra
Hi, > I'd like to know if the browsers IE and Netscape do reuse the > sessions because otherwise it's pretty useless for me taking that SSL-cache > into use. Do you happen to know if they do or not? They do. That's what I meant when I said they cache sessions. When your application starts 1.

Re: Compile errors Win32

2000-09-11 Thread Richard Levitte - VMS Whacker
From: "ukoeppe" <[EMAIL PROTECTED]> ukoeppe> bcc32 -otmp32\randfile.obj -Iinc32 -Itmp32 -DWIN32_LEAN_AND_MEAN -q -w-aus -w-par -w-inl -c -tWC -tWM -DWINDOWS -DWIN32 -DL_ENDIAN -O2 -ff -fp -c .\crypto\rand\randfile.c ukoeppe> .\crypto\rand\randfile.c: ukoeppe> Warning W8017 c:\Borland\Bcc55\inc

Re: Compile errors Win32

2000-09-11 Thread ukoeppe
From: Richard Levitte - VMS Whacker <[EMAIL PROTECTED]> > Looks like you have to. There's a few lines of assembler in > rand_win.c that you can't do without at this time. Perhaps we should > simply turn off readtimer for Borland C? OK, turning off readtimer did the trick for now but I'll get me

what does OpenSSL compete with

2000-09-11 Thread Theodore Hope
Sorry if this is sort of off-topic, but can anyone say what other products OpenSSL "competes" with out there, other than RSA's BSAFE products? Aside from the fact that OpenSSL is free and open-source (just two minor details ;->), why should anyone use it instead of BSAFE or other products (which

Re: what does OpenSSL compete with

2000-09-11 Thread Richard Levitte - VMS Whacker
From: Theodore Hope <[EMAIL PROTECTED]> ssl> Sorry if this is sort of off-topic, but can anyone say ssl> what other products OpenSSL "competes" with out there, ssl> other than RSA's BSAFE products? Are there other commercial products than those from RSA? I've never heard of any, except for hard

Certificate not trusted

2000-09-11 Thread Lin Qiu
Hello, I have installed ssl on my apache server, detail as follow: Web Server: apache_1.3.12 SSL:    openssl-0.9.5a     apache_1.3.12+ssl_1.41 Server ID: from Verisign 1. Create private key : openssl genrsa -des3 -rand file1:...:file5 1024 > www.xxx.com.key 2. Create a CSR:  openssl req -

Re: 0.9.6 beta Test failure

2000-09-11 Thread John Wang
There was no particular reason for using brokengcc. I used it because I had to for 0.9.5a (hpux-gcc failed to compile). I used hpux-gcc for 0.9.6-beta1 afterwards, and the failure is gone! Richard Levitte - VMS Whacker wrote: > > From: John Wang <[EMAIL PROTECTED]> > > jjw> I am not sure if I

Bit size, keys and certificates

2000-09-11 Thread Gary Taylor
I have some newbie questions that I'm trying to get a handle on. I understand there are software products sold that offer 0, 40, and 128 bit encryption. I also understand than when you talk about keys that the strength is measured in bit size. From what I've read a common size is 512bit and

Re: Bit size, keys and certificates

2000-09-11 Thread Rodrigo Coronado
Hi Gary. Gary Taylor wrote: > I have some newbie questions that I'm trying to get a handle on. > > I understand there are software products sold that offer 0, 40, and 128 bit > encryption. I also understand than when you talk about keys that the strength > is measured in bit size. From what I'

Where is INSTALL file?

2000-09-11 Thread Peter Kim
Hi, I'm a newbie. I am interested in installing mod_ssl. I have downloaded mod_ssl html manual. Here's a clip of Chapter 1: The mod_ssl package consists of the SSL module (part 1 in Figure 1) and a set of source patches for Apache adding the Extended API (EAPI) (part 2 in Figure 1) which is

SSL3_READ_BYTES:sslv3 alert illegal parameter

2000-09-11 Thread Michael Lee
I have problem connecting to a web server running Oracle Web Listener 3.0. This is the error message I got: SSL3_READ_BYTES:sslv3 alert illegal parameter (the error occured at line 956 of s23_lib.c) I was using SSLv23_client_method(). However, connection was successful when I used SSLv2_cl

Re: SSL3_READ_BYTES:sslv3 alert illegal parameter

2000-09-11 Thread Michael Lee
Sorry, the error occurred at line 956 of s3_pkt.c, not s23_lib.c - Original Message - From: "Michael Lee" <[EMAIL PROTECTED]> To: "OpenSSL" <[EMAIL PROTECTED]> Sent: Tuesday, September 12, 2000 11:59 AM Subject: SSL3_READ_BYTES:sslv3 alert illegal parameter I have problem connecting t

Error while decrypting

2000-09-11 Thread Atul Alase
I am getting the following error message while trying to decrypt a file. +++ bad decrypt 477:error:06065064:digital envelope routines:EVP_DecryptFinal:bad decrypt:evp_enc.c:243: +++

Start if release cycle

2000-09-11 Thread Richard Levitte - VMS Whacker
Good morning, In a couple of weeks, we plan to release OpenSSL 0.9.6. Before that, there will be a couple of betas, starting with the first some time this afternoon (swedish time). We would like to ask you to help us test these betas as soon as possible and on as many platforms as possible (we

Re: Start if release cycle

2000-09-11 Thread Richard Levitte - VMS Whacker
From: Richard Levitte - VMS Whacker <[EMAIL PROTECTED]> levitte> Good morning, Of course, I forgot to mention our current release plan, which you can find on http://www.openssl.org/news/state.html -- Richard Levitte \ Spannvägen 38, II \ [EMAIL PROTECTED] Chairman@Stacken \ S-168 35 BROMM