Ok, so deriving/extracting the root CA's certificate from an SSL
certificate is not possible.
So, another question:
Can openssl be given an SSL cert and a list of trusted root CAs' certs
and it just output the root CA's cert that goes with (signed) that SSL
cert? Or is it a matter of doing
Hi,
I was wondering if it's possible to derive (or extract?) the root CA's
cert from an given SSL cert using openssl.
What I mean by root CA's cert is the certficate that would be
installed in a browsers list of trusted CAs.
For instance if I have an SSL certificate signed by verisign, I
Hi, I'd like to know if something's possible using the openssl SSL
library.
I have a server running use the OpenSSL library with a cert and private
installed. Now the client code (also using the OpenSSL library) so far
has just been connecting to the server and assuming that it's really
for reading.
A note about this in the documentation for SSL_read() would be nice (or
at *least* a see also)
So it wasn't a hesitation to sent out data, but *my* hesitation to read it.
-- Davy
Davy Durham wrote:
I'm using openssl in some code that very much expects data to get sent
when the write
Davy Durham wrote:
I'm really naive about encryption if you couldn't tell already.
Where are some online resources that explain in plain terms what SSL
uses (i.e. RSA, DSA, IDEA, RC4,.. ) I ready the informative 2
documents already:
http://www.openssl.org/docs/HOWTO/keys.txt and
http
I saw a thread about this before, but I had a follow up question.
I'm wanting to use SSL simply to garbage-ify the data between my server
application and the client. I'd like to use only 128 bit encryption
(CPU limitations). But I cannot generate a certificate with a key this
small.
Do I