> From: [email protected] On Behalf Of KamleshM
> Sent: Tuesday, 12 June, 2012 00:42

> I have an application that is used to sniff the windows https streams.

If you just need the capability, www.wireshark.org already does this 
(for akRSA only, which is all that can be done with only the RSA key).

> To create the certificate and key file, I used the following commands
> 
> 1. openssl req -config "openssl.cnf" -new -out SERVER.csr   
> 2. openssl rsa -in privkey.pem -out SERVER.key
> 3. openssl x509 -in SERVER.csr -out SERVER.cert -req 
>  -signkey SERVER.key -days 364
> 
> The issue I am facing is that in windows , I an unable to decrypt the
> privkey.pem ( RSA private key) file.
> 
> I tried using the PEM_READ_BIOPRIVATEKEY api to decrypt the 
> rsa key, but to no use.
> 
C requires exact spelling; it's PEM_read_bio_PrivateKey . 
It works fine for me on both Windows and Linux. 

What do you mean 'throws'? What exactly is the error message 
or code, or other display, etc?

If your problem is specifically decrypting and not just reading 
or decoding -- e.g. if you don't have the passphrase -- your #2 
created an unencrypted (cleartext) privatekey in SERVER.key; 
you could use that. A cleartext private key is generally a 
security risk, but if your goal is to decrypt (data on) secure 
connections then apparently you don't care about their security.

> Is there any solution for the same ?

Figure out what your program is doing wrong and correct it.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]

Reply via email to