> From: owner-openssl-us...@openssl.org On Behalf Of vishal saraswat
> Sent: Tuesday, 18 August, 2009 07:44
> I am sorry, I forgot to tell you that the final PEM I create
> is composed of key and certificate both.
> cat server_key.pem server server_cert.pem > server.pem
>
> From: owner-openssl-us...@openssl.org On Behalf Of Azlan
> Sent: Tuesday, 18 August, 2009 08:24
> > Hello every one..I'm working with an application in which a module
> > should read a "pem" certificate successfully.I've written 2
> types of
> > programs, but both are failing(PEM_read constan
On Wed, Aug 19, 2009, barcaroller wrote:
>
> I have a PEM-format server certificate that I need to convert to a binary
> structure as defined in section 7.4.2. (Server Certificate) of RFC5246
> (TLS v1.2).
>
>
> Server certificate (in PEM format), residing as a
> text file i
I have a PEM-format server certificate that I need to convert to a binary
structure as defined in section 7.4.2. (Server Certificate) of RFC5246
(TLS v1.2).
Server certificate (in PEM format), residing as a
text file in the filesystem
|
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
vishal saraswat wrote:
| Hi all,
Hello vishal,
| I am sorry, I forgot to tell you that the final PEM I create is composed
| of key and certificate both.
|
| cat server_key.pem server server_cert.pem > server.pem
| Now I suppose that one a client is
toby.wa...@fxhome.com wrote:
> Hello,
>
> I am using the dgst command to sign a file, I'm also using the -hmac
> option. I then want to verify the signature by decrypting it and
> checking the hash. The problem is the hash never seems to match.
It's unclear to me what you are trying to accomplish
Hello,
I am using the dgst command to sign a file, I'm also using the -hmac
option. I then want to verify the signature by decrypting it and
checking the hash. The problem is the hash never seems to match.
For example, if i sign the string "foo" I get the hash below
$ echo foo | openssl dgst -s
Hi There:
If you're looking for a cookbook, and want a fairly comprehensive explanation
of how all of the moving parts work:
http://www.carillon.ca/library/openssl_testca_howto_1.2.pdf
Have fun.
Patrick.
On August 19, 2009 07:18:39 am deblarinteln wrote:
> Hi Goetz, *,
>
> > There is the ma
Why dont you try something as,
X509* user_cert = NULL;
if ((user_cert = PEM_read_X509(fp, NULL, NULL, NULL)) == NULL)
{
/* Error */
}
or with a bio as,
X509 *x = NULL;
if (!PEM_read_bio_X509(bp, &x, 0, NULL))
{
/* Error */
}
On Tue, Aug 18, 2009 at 5:24 AM, Azlan
On Wed, Aug 19, 2009, Carlo Milono wrote:
>
>
> [] My Public Sector Customers seem happy with the functionality, though
> not without a shock: many of their certificates were signed with MD5 (and
> MD2) and our application now happily rejects them (and their CA was
> self-signed with MD5, so di
Please see if you have created certificates correctly :
http://www.g-loaded.eu/2005/11/10/be-your-own-ca/
This may help.
Regards,
Abhishek
2009/8/19 Matthias Güntert
> > Can someone please shed some light on this? This are the
> > test-certificates I have been using.
>
> I figured it out:
>
>
11 matches
Mail list logo