If there's a solution using existing code (ie the openssl utility) then I'm 
asking the same questions (in effect) in the "Practical CA problem" 
threads, so you might want to look at any answers that appear there 
(hopefully!) too.

(You could also encrypt and then decrypt some data - if you get the same 
data out that you put in then they are consistent, of course.  Also, 
depending on the algorithm, you can check the expected mathematical 
relation between the keys - for RSA, iirc, one is a factor of the other.)

Andrew

At 05:48 PM 8/24/01 -0400, you wrote:

>I looked through the apps and could not find any which did this.
>
>I have a X509 * and EVP_PKEY * structure and want to be sure that they do
>in fact match. So if they are invalid I can just not install them for use
>in the server and throw an error. I'm using RSA keys if that makes a
>difference.
>
>thanks,
>
>-James
>
>--
>James A. Russo
>Systems Engineer
>Verio, Inc.
>[EMAIL PROTECTED]
>
>______________________________________________________________________
>OpenSSL Project                                 http://www.openssl.org
>User Support Mailing List                    [EMAIL PROTECTED]
>Automated List Manager                           [EMAIL PROTECTED]

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to