The input to the hash should be the base64-decoded value of the lines
between X CERTIFICATE-, like this --
openssl x509 -in cer.cert -text | perl -ne 'print if /BEGIN/../END/' |
openssl base64 -d | openssl md5 -hex
Max
Oscar So wrote:
Hi,
I know that to calculate the
Richard Kao wrote:
Hi I'm a newbie to openssl. This is actually a question about concept,
and I hope this is the place I can ask this question.
Basically speaking, I'm trying to get the pointer to Certificate in a
raw Server Hello packet on the Client side. So far when the client
receives a
On Mon, 2006-04-03 at 18:54 -0500, ext Jay Potter wrote:
Hi,
I want to use the PreSharedKeys in TLS using AES-256 as specified in
RFC 4279. I would like to utilize this within a browser such as
FireFox. Anyone have any experience in this area to give me some
guidance what needs to be
Hello,
I have uncovered what I believe to be a bug in b_print.c.
The problem turned up when I tried to convert to openssh, which is
dependent upon openssl. The ssh-keyscan program returned garbage SSH1
keys when it was executed from an IRIX platform. When the same
versions of the code were
On Mon, Apr 03, 2006, Oscar So wrote:
Hi,
I know that to calculate the fingerprint of an x509 certificate is to hash
(SHA1 and MD5)
the PEM format of an x509 certificate.
However, I am not sure if I should hash the whole PEM file or leave the
header and footer alone. For example, should I
testtsa has a line
test $? == 0 error
shouldn't this be
test $? = 0 error
or
test $? -eq 0 error
--
To verify the signature, see http://edelpki.edelweb.fr/
Cela vous permet de charger le certificat de l'autorité;
die Liste mit zurückgerufenen Zertifikaten finden Sie da auch.
The #define _POSIX_C_SOURCE 2 at the beginning of apps/apps.c causes
string.h on Solaris not to declare strcascmp.
Shouldn't #define be protexct by an #ifdef for VMS?
--
To verify the signature, see http://edelpki.edelweb.fr/
Cela vous permet de charger le certificat de l'autorité;
die