openssl req -new -key server1.key -out server1.csr

-------------------------------------------------------------------------------
John Hascall, j...@iastate.edu
Team Lead, NIADS (Network Infrastructure, Authentication & Directory Services)
IT Services, The Iowa State University of Science and Technology

> Dear OpenSSL Community,
> 
> I am a new user of OpenSSL and have a pretty simple question.  I'm 
> trying to create a self-signed certificate and so far has done the 
> following.
> Step 1)>openssl genrsa -des3 -out server1.key 1024
> Step 2)This asked for a password and I made a password "asdf"
> Step 3) >openssl req -key server1.key -out server1.csr
> Step 4)At the first prompt, I typed in "asdf" and pressed enter.  
> Nothing happens.  I keep pressing enter and then mash they keyboard 
> until this message appears "unable to load X509 request 
> 6416:error:0906D06C:PEM routines:PEM_read_bio:no start 
> line:.\crypto\pem_lib.c:642:Expecting: CERTIFICATE REQUEST"
> Step 5) I retired the above command except with the wrong password 
> "asdfg" and it looks like I had a bad decrypt error message
> 
> Can someone tell me if I'm doing anything wrong when creating a simple 
> self-signed certificate so far? 
> 
> I am using Windows Vista as my OS with Win32 OpenSSL v1.0.0d and Visual 
> C++ 2008 Redistributables
> downloaded from this site: 
> http://www.slproweb.com/products/Win32OpenSSL.html
> 
> Thank you for any help you can provide. 
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
> 

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to