Hello
I generated the certificate programmatically, but I shall look at the
ecparam.c file and see how the public key is generated there and do the
same. The jave keytool-generated certificate did not have any extensions
attached, so I am guessing those can be stripped.
The code I used for
Please see if you have created certificates correctly :
http://www.g-loaded.eu/2005/11/10/be-your-own-ca/
This may help.
Regards,
Abhishek
2009/8/19 Matthias Güntert matzeguent...@gmx.de
Can someone please shed some light on this? This are the
test-certificates I have been using.
I
On Wed, Aug 19, 2009, Carlo Milono wrote:
[cm] My Public Sector Customers seem happy with the functionality, though
not without a shock: many of their certificates were signed with MD5 (and
MD2) and our application now happily rejects them (and their CA was
self-signed with MD5, so ditto
Why dont you try something as,
X509* user_cert = NULL;
if ((user_cert = PEM_read_X509(fp, NULL, NULL, NULL)) == NULL)
{
/* Error */
}
or with a bio as,
X509 *x = NULL;
if (!PEM_read_bio_X509(bp, x, 0, NULL))
{
/* Error */
}
On Tue, Aug 18, 2009 at 5:24 AM, Azlan
Hi There:
If you're looking for a cookbook, and want a fairly comprehensive explanation
of how all of the moving parts work:
http://www.carillon.ca/library/openssl_testca_howto_1.2.pdf
Have fun.
Patrick.
On August 19, 2009 07:18:39 am deblarinteln wrote:
Hi Goetz, *,
There is the man
Hello,
I am using the dgst command to sign a file, I'm also using the -hmac
option. I then want to verify the signature by decrypting it and
checking the hash. The problem is the hash never seems to match.
For example, if i sign the string foo I get the hash below
$ echo foo | openssl dgst
toby.wa...@fxhome.com wrote:
Hello,
I am using the dgst command to sign a file, I'm also using the -hmac
option. I then want to verify the signature by decrypting it and
checking the hash. The problem is the hash never seems to match.
It's unclear to me what you are trying to accomplish
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
vishal saraswat wrote:
| Hi all,
Hello vishal,
| I am sorry, I forgot to tell you that the final PEM I create is composed
| of key and certificate both.
|
| cat server_key.pem server server_cert.pem server.pem
| Now I suppose that one a client is
I have a PEM-format server certificate that I need to convert to a binary
structure as defined in section 7.4.2. (Server Certificate) of RFC5246
(TLS v1.2).
Server certificate (in PEM format), residing as a
text file in the filesystem
|
On Wed, Aug 19, 2009, barcaroller wrote:
I have a PEM-format server certificate that I need to convert to a binary
structure as defined in section 7.4.2. (Server Certificate) of RFC5246
(TLS v1.2).
Server certificate (in PEM format), residing as a
text file in the
From: owner-openssl-us...@openssl.org On Behalf Of Azlan
Sent: Tuesday, 18 August, 2009 08:24
Hello every one..I'm working with an application in which a module
should read a pem certificate successfully.I've written 2
types of
programs, but both are failing(PEM_read constantly
From: owner-openssl-us...@openssl.org On Behalf Of vishal saraswat
Sent: Tuesday, 18 August, 2009 07:44
I am sorry, I forgot to tell you that the final PEM I create
is composed of key and certificate both.
cat server_key.pem server server_cert.pem server.pem
12 matches
Mail list logo