Hi,
On Tue, Feb 20, 2018 at 01:27:51PM +, Viktor Dukhovni wrote:
> > In the commonly accepted variants of PKCS#12, private key and all the
> > certificates are encrypted with the same password. PKCS#12 with
> > different password for private key and certificates is not widely
> > supported.
Hi,
On Wed, Feb 21, 2018 at 01:04:17AM +0900, Frank Migge wrote:
> >> the question remains: Is there a way to reuse an already-encrypted privkey?
> I'd say yes it *could* work, but not with OpenSSL API functions. You'd
> have to roll your own code for the PKCS12 creation.
> OpenSSL's
Hi Toby,
>> the question remains: Is there a way to reuse an already-encrypted privkey?
I'd say yes it *could* work, but not with OpenSSL API functions. You'd
have to roll your own code for the PKCS12 creation.
OpenSSL's PKCS12_create() function expects an unencrypted EVP_PKEY
object. But,
On Tue, Feb 20, 2018 at 12:23:14PM +0100, Jakob Bohm wrote:
> > I was wondering whether it was possible somehow to take a certificate and an
> > enciphered private key, both in .pem format, and combine them into a PKCS12
> > structure without knowing the key passphrase?
>
> In the commonly
Hi,
On Tue, Feb 20, 2018 at 12:23:14PM +0100, Jakob Bohm wrote:
> >Googling does not reveal much useful information, unfortunately, and so far
> >we
> >have been unsuccessfully diving into PKCS12/8/5 specs. I don't really see a
> >reason why it should not be possible, but of course that doesn't
On 20/02/2018 11:04, Tobias Dussa (SCC) wrote:
Hi,
I was wondering whether it was possible somehow to take a certificate and an
enciphered private key, both in .pem format, and combine them into a PKCS12
structure without knowing the key passphrase?
Googling does not reveal much useful
Hi,
I was wondering whether it was possible somehow to take a certificate and an
enciphered private key, both in .pem format, and combine them into a PKCS12
structure without knowing the key passphrase?
Googling does not reveal much useful information, unfortunately, and so far we
have been