Re: Verifying that a private key and certificate match

2007-02-19 Thread Goetz Babin-Ebell
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Julius Davies wrote: > RSA keypair, right? If so, compare that the modulus of both the > certificate and the private key is equal. These two commands do the > trick: > > openssl x509 -in cert.pem -modulus -noout > > openssl rsa -in rsa.pem -modulus

Re: Verifying that a private key and certificate match

2007-02-19 Thread Keith Thompson
On Mon 07-02-19 16:11, Julius Davies wrote: > RSA keypair, right? If so, compare that the modulus of both the > certificate and the private key is equal. These two commands do the > trick: > > openssl x509 -in cert.pem -modulus -noout > > openssl rsa -in rsa.pem -modulus -noout > > > If on Un

Re: Verifying that a private key and certificate match

2007-02-19 Thread Julius Davies
RSA keypair, right? If so, compare that the modulus of both the certificate and the private key is equal. These two commands do the trick: openssl x509 -in cert.pem -modulus -noout openssl rsa -in rsa.pem -modulus -noout If on Unix, I imagine you can do this (ahhh... the glorious back-tick!)

Using Engine interface in openssl to interface with Crypto Hardware

2007-02-19 Thread Roy, Anindya \(Anindya\)
Has anybody used the Engine interface in the openssl to integrate with FreeScale PowerPC Quicc III 8548E ? Any pointers or info in this regard will be of great help. Thanks, Cheers Anindya __ OpenSSL Project

Verifying that a private key and certificate match

2007-02-19 Thread Mark H. Wood
Is there a built-in command in the openssl utility which can verify that a private key and a certificate represent a valid keypair? Or is there some simple way to determine this using other built-in commands? -- Mark H. Wood, Lead System Programmer [EMAIL PROTECTED] Typically when a software v

Re: ALL vs DEFAULT or how to properly order anonymous ciphers?

2007-02-19 Thread Victor Duchovni
On Mon, Feb 19, 2007 at 02:19:27PM -0500, Victor Duchovni wrote: > This is not quite right IMHO. I think the anonymous ciphers MUST be > first, because: > > 1. Most applications use "DEFAULT" and don't see them at all. > > 2. Applications that want anonymous ciphers, typically don't disa

Re: ALL vs DEFAULT or how to properly order anonymous ciphers?

2007-02-19 Thread Victor Duchovni
On Mon, Feb 19, 2007 at 07:43:50PM +0100, Bodo Moeller wrote: Thanks, a giant leap in the right direction! Nit-picking below: > + /* Move anonymous ciphers to the end. Usually, these will remain > disabled. > + * (For applications that allow them, they aren't too bad, but we prefer > +

Re: ALL vs DEFAULT or how to properly order anonymous ciphers?

2007-02-19 Thread Bodo Moeller
On Sat, Feb 17, 2007 at 11:45:58PM -0500, Victor Duchovni wrote: > Currently the OpenSSL "DEFAULT" cipherlist serves two functions: > > - Sort the cipherlist to put the strongest, most desirable algorithms > first. > > - Exclude ciphers that most applications should not be exposed to

Re: Bio - error messages

2007-02-19 Thread Dr. Stephen Henson
On Mon, Feb 19, 2007, Milan K?pek wrote: > Hi, in my openssl project I must be able to create TCP or TCP/TLS connection. > When I connect only with TCP protocol, I do it with BIO_do_connect. Sometimes > my connection is terminated. And I need a little bit more information what > happend. > >

Bio - error messages

2007-02-19 Thread Milan Křápek
Hi, in my openssl project I must be able to create TCP or TCP/TLS connection. When I connect only with TCP protocol, I do it with BIO_do_connect. Sometimes my connection is terminated. And I need a little bit more information what happend. I use this code rc = BIO_write(bio, message.c_str() ,