Viktor,
   Thank you for your help. I am using curl in a project actually. And I want 
to configure curl to do my custom authentication job. I am going to write an 
independent code and post it up with my cert. But before that I'd like to ask 
you whether it is caused by my cert. The cert looks like the following. I put 
certificate and private key together in a single file named "servercert.pem". 
Is it a correct or legal cert.pem file? 
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----


-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Victor Duchovni
Sent: 2008年1月17日 11:30
To: openssl-users@openssl.org
Subject: Re: About certificate sha1 thumbprint

On Thu, Jan 17, 2008 at 10:14:28AM +0800, Hou, LiangX wrote:

> No. I try to convert binary digest to hexadecimal strings outside and compare 
> it with what is generated by the command-line tool. And I find they are 
> different. The strange thing is that the thumbprint generated by my 
> X509_digest begins with zero. That may be something wrong. Is it?
> 

What's wrong with zero? The raw digest is a set of pseudo-random bytes,
of none of the bytes or nibbles were ever zero, that would be strong
evidence that the hash is flawed.

You have not posted the relevant code, and your problem descriptions
are vague. If you want help you need to post clear problem descriptions
and a complete example constiting of a cert.pem file and code with
working Makefile that computes the "wrong" digest for the certificate
(different from what is reported by "openssl x509 -sha1 -fingerprint
-noout -in cert.pem").

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to