I generated a cert for your privatekey using a fake CA I have 

for my testing (which I already set up in my systems).

 

If you want to set up your own, it's simple in principle, but 

there are quite a few options and details. At a minimum:

 

- create a CA key and a selfsigned (root) cert for that key:

  openssl req -newkey rsa:2048 -x509 -days N -keyout cakey.pem -out
cacert.pem

  # substitute other type and/or size/params of key if desired

  # specify -config file if not default

  # answer prompts for name (DN), or change config file, or use -subj

  # if desired set extensions in config file, or -extensions (section) on
commandline 

- distribute cacert.pem and install where needed

- if using 'ca' below, create empty index.txt file 

- both ways create serial file with reasonable value e.g. 01

 

For each desired EE key&cert, in this case your single one:

- create a req (CSR) for that key, with suitable name (DN)

  openssl req -new -key foo.key -out foo.csr 

  # specify -config if not default and DN as above

  # can put extensions in CSR but usually better in cert below

 

and then issue a cert EITHER:

  openssl ca [-config xx] -in foo.csr -out foo.crt 

  # -days in config file or commandline

  # extensions in config file or referenced by command line if desired

OR:

  openssl x509 -req -days N -CA cacert.pem -CAkey cakey.pem -in foo.csr -out
foo.crt

  # extensions referenced by commandline (only)

 

Use foo.crt in good health.

 

From: owner-openssl-us...@openssl.org
[mailto:owner-openssl-us...@openssl.org] On Behalf Of Andrew Arnott
Sent: Saturday, March 22, 2014 14:56
To: openssl-users@openssl.org
Subject: *** Spam *** Re: When P is larger than Q

 

Thanks Dave. Where do you get the cert file to use as input?

<snip>

From: Dave Thompson <mailto:dthomp...@prinpay.com> 
Sent: Friday, March 21, 2014 3:37 PM
To: openssl-users@openssl.org

<snip>

I don't think this violates any standard and it works fine on my Windows
(which is 7).

I took your privatekey, which is indeed PKCS#1, generated a (fake) cert, put
them in a PKCS12,

which Windows [7] imported okay and IE(9) was then able to use to
authenticate to 

my test server (which trusts the fake cert). Where are you seeing the "Bad
Data"? 

<snip>

Reply via email to