RE: [openssl-users] Re: stateOrProvinceName field problem when signing CSR

2011-12-28 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Mick > Sent: Monday, 26 December, 2011 14:01 > I seem to have overcome the original problem. Now both the > cacert and signed > client certificates are formatted in the same way. I used -policy > policy_anything to avoid complaints from o

RE: req insists on a config file now?

2011-12-28 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Matthew Pounsett > Sent: Wednesday, 28 December, 2011 13:24 > It looks like there's been a recent change that's causing > 'req' to insist on a config file, presumably for reading the > OID info from. Is there a way to get the interactive mode

RE: Supporting oldwithold, newwithnew CA certificates Reg.

2011-12-28 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Ashok C > Sent: Tuesday, 27 December, 2011 06:20 > But regarding this: > >>Important note: make sure the old and new root certs have different > names. (Same for intermediate CAs, which your example doesn't have.) >

Re: decrypt with a public key

2011-12-28 Thread Ireneusz Szcześniak
On 28.12.2011 19:50, Dr. Stephen Henson wrote: The public key decrypt and private encrypt operations correspond to the -verify and -sign options to rsautl which is why I suggested them. Now I understand. I mistakenly thought that -sign and -verify were used to attach and examine an encrypted

Re: decrypt with a public key

2011-12-28 Thread Kenneth Goldman
When you use public key algorithms: You encrypt with the recipient's public key and the recipient decrypts with their private key. You sign with your private key and the recipient verifies with your public key. owner-openssl-us...@openssl.org wrote on 12/28/2011 01:43:17 PM: > From: Ireneusz S

req insists on a config file now?

2011-12-28 Thread Matthew Pounsett
It looks like there's been a recent change that's causing 'req' to insist on a config file, presumably for reading the OID info from. Is there a way to get the interactive mode back? > openssl genrsa -out server.key 2048 WARNING: can't open config file: /usr/local/openssl/openssl.cnf Generatin

Re: decrypt with a public key

2011-12-28 Thread Dr. Stephen Henson
On Wed, Dec 28, 2011, Ireneusz Szcze??niak wrote: > Thank you, Steve, for your post. Let me explain what I'm trying to > do. In the public key cryptography: > > message = Dprv(Epub(message)) = Dpub(Eprv(message) > > D stands for decrypt, E for encrypt > prv - private key, pub - private key >

Re: decrypt with a public key

2011-12-28 Thread Ireneusz Szcześniak
Thank you, Steve, for your post. Let me explain what I'm trying to do. In the public key cryptography: message = Dprv(Epub(message)) = Dpub(Eprv(message) D stands for decrypt, E for encrypt prv - private key, pub - private key And so I tried to do this with the openssl command. On 28.12.201

Re: decrypt with a public key

2011-12-28 Thread Dr. Stephen Henson
On Wed, Dec 28, 2011, Ireneusz Szcze??niak wrote: > Hi, > > In public key cryptography, a message encrypted with a private key > can be decrypted with a public key, and so I tried: > > openssl rsautl -encrypt -inkey private-key -in message -out cryptogram > > openssl rsautl -decrypt -inkey publ

decrypt with a public key

2011-12-28 Thread Ireneusz Szcześniak
Hi, In public key cryptography, a message encrypted with a private key can be decrypted with a public key, and so I tried: openssl rsautl -encrypt -inkey private-key -in message -out cryptogram openssl rsautl -decrypt -inkey public-key -pubin -in cryptogram The problem is that the second com

how to see the SSL handshake

2011-12-28 Thread Mithun Kumar
Hello Forum, I am currently running the samples(client1,server1) , is there any environmental variables that i need to export so that i can get the SSL handshake tracing? -Thanks mithun