Thanks a lot, David !
This mail will definitely throw me miles ahead.
Thanks
Ramaniganth V.S.
Nortel : 6-877-8976
Wipro : +91-80-28520408 Xtn: 81109
Mobile: +91-9972227096
Loc.: T8-1F-A-079, EC-3, Wipro Tech., #72, Keonics Electronics City,
Hosur Main Rd, Bangalore - 560 100.
_
"David Schwartz" <[EMAIL PROTECTED]> writes:
>> Hi, a question about the SSL:
>>
>> In SSL, the server certificate is checked by the
>> client as to whether the server actually holds the
>> private key of it. This is done by client sending the
>> session key signed by server's public key.
>>
>> So
One way is 'PEM_read_PrivateKey', which reads a private key (PEM in
this case) from a FILE*.
Jim
On Jul 22, 2007, at 7:55 PM, Nagendra Tomar wrote:
Hi
I would like to know if there is a libcrypto API to read a
public/private key from a keyfile and populate the RSA structure,
so th
I see that PEM_read_RSAPrivateKey looks like the one I need.
Thanx,
Tomar
Nagendra Tomar <[EMAIL PROTECTED]> wrote: Hi
I would like to know if there is a libcrypto API to read a public/private
key from a keyfile and populate the RSA structure, so that one can do
other operations (encrypt,
hello,
Ok, i will try first
thanks,
Best regards,
ST. Hermawan
On 7/20/07, Marek Marcola <[EMAIL PROTECTED]> wrote:
Hello,
> i find an information about add new chipers BF-CBC but find nothing.
> may be somone ever find thid?
Look at:
http://www.openssl.org/docs/crypto/blowfish.html
Hi
I would like to know if there is a libcrypto API to read a public/private
key from a keyfile and populate the RSA structure, so that one can do
other operations (encrypt, sign, decrypt, verify) using that RSA struct.
What I am looking for is an equivalent of SSL_use_RSAPrivateKey_file
On Sat, Jul 21, 2007 at 09:28:16AM +0200, Bernhard Froehlich wrote:
> I agree it would be a cool extension to OpenSSL to fetch certificates
> from an LDAP server, but I would like to be able to use OpenSSL with
> only that simple file storage also!
This makes sense for finding certs of peers fo
> Hi, I see this option when I import but I don't understand something
> more fundamental. Why doesn't the cert itself have any password
> protection? Is it because when I created it I specified the key
> password only to build the cert from the key? And the cert gets built
> with no protection?
>
Hello,
--On Juli 22, 2007 14:22:42 + nobody <[EMAIL PROTECTED]> wrote:
On Fri, 20 Jul 2007 21:38:47 +0200
Goetz Babin-Ebell <[EMAIL PROTECTED]> wrote:
--On Freitag, Juli 20, 2007 14:49:54 + nobody <[EMAIL PROTECTED]>
wrote:
[...]
> Then I exported it in pkcs12 format and imported it
On Sat, 21 Jul 2007 00:25:54 +0200
"Dr. Stephen Henson" <[EMAIL PROTECTED]> wrote:
> On Fri, Jul 20, 2007, Goetz Babin-Ebell wrote:
>
> > Hello,
> >
> > --On Freitag, Juli 20, 2007 14:49:54 + nobody
> > <[EMAIL PROTECTED]> wrote:
> >
> > [...]
> > >Then I exported it in pkcs12 format and im
On Fri, 20 Jul 2007 21:38:47 +0200
Goetz Babin-Ebell <[EMAIL PROTECTED]> wrote:
> Hello,
>
> --On Freitag, Juli 20, 2007 14:49:54 + nobody <[EMAIL PROTECTED]>
> wrote:
>
> [...]
> > Then I exported it in pkcs12 format and imported it into Internet
> > Explorer and Thunderbird. I've sent encr
11 matches
Mail list logo