Hi,
To perform the conversion, use your favorite XML library to extract the
BASE64 values in the Modulus and Exponent nodes, then create an EVP_PKEY
structure from these using the functions I'm pasting below. From here,
call PEM_write_PUBKEY to create a PEM file that will contain your RSA
public k
> From: owner-openssl-us...@openssl.org On Behalf Of Gary
> Sent: Friday, 17 September, 2010 09:19
To slightly clarify a few points:
> Gary wrote:
[needs to use php/mcrypt to produce ciphertext acceptable
to openssl enc -d with specific options he can't change]
> > Dave Thompson wrote:
> (loads
> From: owner-openssl-us...@openssl.org On Behalf Of Jan Danielsson
> Sent: Friday, 17 September, 2010 18:40
>For certain reasons I want to load the OpenSSL libraries
> at run-time [and] load a PKCS#12 file ...
>The relevant code snippets follows (the code below is just exerts,
> and part
> From: owner-openssl-us...@openssl.org On Behalf Of Eric Nichols (DirWiz)
> Sent: Thursday, 16 September, 2010 17:35
> I am working with a legacy app and need to use OpenSSL to decrypt
> Blowfish-cbc. The library in question
> (http://search.cpan.org/~lds/Crypt-CBC-2.30/CBC.pm) uses a 56
> byte
Hi All
I have a RSA public key provided in the below format and would like to know how
to convert it into a format like PEM or any other format which can be read by
openssl. I didnt find any conclusive solutions for this on www. Will
the application which generated this key format be capable o
Hi,
First, OpenSSL_add_all_algorithms is just a define that resolves to
OPENSSL_add_all_algorithms_noconf (or OPENSSL_add_all_algorithms_conf if
you define OPENSSL_LOAD_CONF in your build). It's there on evp.h .
To solve you PKCS#12 problem, all you need is to call
OpenSSL_add_all_algorithms at t
Hello,
For certain reasons I want to load the OpenSSL libraries at run-time
(rather than at load-time). My application will specifically need to be
able to load a PKCS#12 file, and fiddle around with the data in it.
The relevant code snippets follows (the code below is just exerts,
and part
On Fri, Sep 17, 2010 at 10:40:45AM -0400, Tom Cocagne wrote:
> I've been searching for a way to set up an encrypted SSL connection
> that doesn't require the use of certificates. Ideally, I'd like to use
> SSL + SRP as specified in RFC 5054 but, as that isn't yet commonly
> available, I'd like to
On 09/17/2010 04:40 PM, Tom Cocagne wrote:
Greetings,
I've been searching for a way to set up an encrypted SSL connection
that doesn't require the use of certificates. Ideally, I'd like to use
SSL + SRP as specified in RFC 5054 but, as that isn't yet commonly
available, I'd like to fall back to
Greetings,
I've been searching for a way to set up an encrypted SSL connection
that doesn't require the use of certificates. Ideally, I'd like to use
SSL + SRP as specified in RFC 5054 but, as that isn't yet commonly
available, I'd like to fall back to setting up an anonymous but
encrypted SSL con
Hi Andy:
Well, aside from violating most of the standards around PKI, the main problem
you will have is revocation - the way you revoke a certificate is to put it's
serial number on a CRL. So if you have multiple certs with the same serial
number, if you ever need to revoke one of those certifi
Hello,
Just curious if anyone knows, but what happens if I generate multiple server
certs (using my self generated signing CA using openssl) that have the same
assigned serial number?
Does this create a conflict within the network and if users's end up accessing
both certs, kabm?
Is
12 matches
Mail list logo