Sorry, but this is just getting more interesting: it seems that the call
fails when I type the right password (within the app, not in my sample).
It is when I typed the wrong password that the call succeeded, but
returned the empty key...
Will keep investigating...
Dirce
> I made some progress.
I made some progress. The call to PKCS12_parse succeeded, but the pkey
returned was NULL. Please see below where I indicated how I created this
.p12 file. I wonder why the PKCS12_parse command can't read its private
key. I keep suspecting on permissions, but they seem ok - this app is
running as c
Hello,
I am maintaining a piece of code that calls PKCS12_parse. It worked with
an older version of openssl (0.9.8m), but it is not working with version
1.0.0
Here are some clips:
X509 *cert = NULL;
BIO*in = NULL;
STACK_OF(X509) *ca_certs = NULL;
PKCS12
It is for RSA keys.
Thanks,
Dirce
> Somewhere I have read that RSA key size limit is 32k or so. Largest key
> I have attempted to generate was 24k, largest key successfully
> generated and used was 16k. Are the these RSA keys or DH parameters?
> In any case 2048bit (2k) sized keys are supported
Hello,
I am working on a product where we are upgrading from openssl-0.9.8.d to
version 1.0.0, and we want to transition from using 1024 bit keys to 2048.
I am coming up to speed with SSL in general. My question is: was key
length of 2048 already supported on openssl-0.9.8.d? I did read about it
in