> X509 cert = SSL_CTX_get0_certificate(ctx);
> EVP_PKEY pkey = X509_get_pubkey(cert);
>
*cert and *pkey ...
On Tue, Nov 02, 2021 at 08:28:01PM +, Jason Schultz wrote:
> Victor-
>
> I can't seem to find any documentation on SSL_CTX_get0_privatekey(),
> but by the name of it, it sounds like it's getting the private key;
> I'm trying to get the public key.
It does appear to be "under-documented" (i.e.
On Tue, Nov 2, 2021 at 3:42 PM Jason Schultz wrote:
> I thought I should start a new thread since this question was buried in my
> "FIPS" thread and I dont' think it has anything to do with FIPS and OpenSSL
> providers. I'm hitting another problem that I think is related to the
> migration to Ope
Victor-
I can't seem to find any documentation on SSL_CTX_get0_privatekey(), but by the
name of it, it sounds like it's getting the private key; I'm trying to get the
public key.
That said, I should probably explain more of why I'm doing what I'm doing,
because there may be an easier way all t
您好,您的邮件我已收到,我会尽快阅读,谢谢!
On Tue, Nov 02, 2021 at 07:42:15PM +, Jason Schultz wrote:
> I thought I should start a new thread since this question was buried in my
> "FIPS" thread and I dont' think it has anything to do with FIPS and OpenSSL
> providers. I'm hitting another problem that I think is related to the
> mig
Sorry, I send this before finishing the Aside. I ended up calling these APIs:
DECODER_ctx = OSSL_DECODER_CTX_new_for_pkey(EVP_PKEY **pkey,
const char *input_type,
const char *input_struct,
const char *keyt
I thought I should start a new thread since this question was buried in my
"FIPS" thread and I dont' think it has anything to do with FIPS and OpenSSL
providers. I'm hitting another problem that I think is related to the migration
to OpenSSL 3.0, as this code works with OpenSSL 1.1.1 (and 1.0.2
On 02/11/2021 04:42, Alex Dankow wrote:
Matt,
Thank you very much for your response. I understand that the FIPS
certified OpenSSL module is long awaited and the team was quite limited
in time to complete all features.
I tried Windows certificates +Openssl because it implements the most
com
On Tue, 2021-11-02 at 11:42 +0700, Alex Dankow wrote:
> Matt,
>
> Thank you very much for your response. I understand that the FIPS
> certified OpenSSL module is long awaited and the team was quite
> limited in time to complete all features.
> I tried Windows certificates +Openssl because it impl
10 matches
Mail list logo