HFS has several meanings, and so does keyring, but they seem to be used in
combination only for some 

SSL/TLS piece of IBM z/OS.  My top google hit is pic.dhe.ibm.com which
sounds authoritative but responds down.

The next page of hits are mostly looking at small patches of the elephant,
but several indicate there is a command 

'gskkyman' to manage the z/OS database(s?) of certs and keys.

 

Nothing I find suggests that z/OS is actually using openssl, and in my
limited experience z/OS tends not to use 

open-source cross-platform software like openssl. Certainly the file
extensions you give are not usually 

used with openssl except possibly .cer (which is used by everybody+dog, and
in openssl somethingcert.pem 

or .der are somewhat more likely) although they can be chosen arbitrarily
and might have been here.

 

If those are in fact openssl files, for us to help you'll have to identify
what they are. 

 

openssl uses two primary file formats, PEM and DER, usually (but not always)
reflected in file extensions 

or names.PEM data is stored as text, but in a special (restricted) format;
they have a line like 

-----BEGIN something-----, followed by one or more lines of base64 which
consists of letters, digits,

occasionally plus or slash, and often equals  at the end, then a line like
-----END something----- .

There may be more than one PEM blob in a file. If that's what your files
look like, tell us what 

the 'something's are. DER files are binary and readable only with
specialized tools. If your file looks 

like mostly gibberish it could be DER or it could be lots of other things.
If you have openssl commandline 

or can binary-transfer the files to a system that does, 'openssl asn1parse
-inform der' will tell show 

if it's some kind of DER and a knowledgeable reader can usually figure out
which. Note that if these 

files contain a private key, as an SSL 'keyring' must, you may not be
allowed to transfer it.

 

 

From:  <mailto:owner-openssl-us...@openssl.org>
owner-openssl-us...@openssl.org [ <mailto:owner-openssl-us...@openssl.org>
mailto:owner-openssl-us...@openssl.org] On Behalf Of Jake anderson
Sent: Thursday, February 06, 2014 04:48
To:  <mailto:openssl-users@openssl.org> openssl-users@openssl.org
Subject: *** Spam *** Clarification for renewing OPENSSL certificate

 

Hello,

One of our OPEN SSL keyring is expired.

error 18 at 0 depth lookup:self signed certificate
error 10 at 0 depth lookup:Certificate has expired 
OK                                                 

currently our key locations has the below files : 

ctscert,ctscert.cer,ctscert.rdb,ctscert.sth

So We have been usong ctscert as the HFS keyring for our telnet server.
Could someone please help me in renewing or creating a new hfs keyring.

Any suggestions highly appreciated.

Jake

 

Reply via email to