If there's a solution using existing code (ie the openssl utility) then I'm
asking the same questions (in effect) in the "Practical CA problem"
threads, so you might want to look at any answers that appear there
(hopefully!) too.
(You could also encrypt and then decrypt some data - if you get the same
data out that you put in then they are consistent, of course. Also,
depending on the algorithm, you can check the expected mathematical
relation between the keys - for RSA, iirc, one is a factor of the other.)
Andrew
At 05:48 PM 8/24/01 -0400, you wrote:
>I looked through the apps and could not find any which did this.
>
>I have a X509 * and EVP_PKEY * structure and want to be sure that they do
>in fact match. So if they are invalid I can just not install them for use
>in the server and throw an error. I'm using RSA keys if that makes a
>difference.
>
>thanks,
>
>-James
>
>--
>James A. Russo
>Systems Engineer
>Verio, Inc.
>[EMAIL PROTECTED]
>
>______________________________________________________________________
>OpenSSL Project http://www.openssl.org
>User Support Mailing List [EMAIL PROTECTED]
>Automated List Manager [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]