.pem and privkey.pem"
> openssl req -out CA.pem -new -x509
>
> "To sign the server cert"
> openssl x509 -req -in server.req -CA CA.pem -CAkey privkey.pem -CAserial
> file.srl -out server.pem
Add:
-days 1825
in both command lines.
--
Chris Cleeland, cleeland
all before about a couple of weeks ago, and I'm trying to understand the
> big picture.
It's a pretty intimidating subject for newbies and there's not much
comprehensive documentation out there. Feel free to hit me with more
questions if you want.
-cj
--
Chris Cleeland,
ar from now.
You can view the expiration date for an x509 certificate by reading the
output of
$ openssl x509 -text -in mycert.pem
Look for something like this:
Validity
Not Before: Mar 22 16:22:15 2002 GMT
Not After : Mar 22 16:22:15 2003 GMT
-cj
--
On 30 Apr 2002, Eric Rescorla wrote:
> Chris Cleeland <[EMAIL PROTECTED]> writes:
> > On Tue, 30 Apr 2002, Ed Moyle wrote:
> > Does anybody know if the "wrong signature length" problems in JSSE have been
> > fixed? Otherwise, I don't think this&
ck out the following link:
http://groups.google.com/groups?hl=en&frame=right&th=364ff2e1a2f20db0&seekm=40373dc3.0108131639.3b69c55d%40posting.google.com#link3
-cj
--
Chris Cleeland, cleeland_c @ ociweb.com, http://www.milodesigns.com/~chris
Principal Software Engineer, Ob
the two programs are
> > separate with separate licenses.
>
> Thank you! I hadn't thought of that, and it sounds like fun too.
Sounds like this would be a great facility to stick into a contrib
directory...call it "glen"--Gnu Linkage ENabler?
--
Chris Cleeland, cleeland_c
bles "cert_owner" and "MAILADDR", respectively.
If your CA private key has a passphrase, you can also use the -passin option
to provide the passphrase via a multitude of ways.
-cj
PS BTW, I cobbled together this knowledge from docs/openssl.txt and the
various manpages (r