> On Dec 19, 2016, at 2:12 AM, Brice André wrote:
>
> On self-written client side, I use C++ code whose soap part is generated by
> gsoap. You will find attached the generated code, as well as the wrapper that
> I wrote and that uses the generated code). I also use openssl (1.0.1j 15 Oct
> 20
> On Dec 18, 2016, at 4:52 PM, Brice André wrote:
>
> I know that the current certificate is the old one, but this
> is because my service is in production.
>
> I tested new certificate this evening to limit the number of
> impacted clients. And as it did not worked, i reinstalled
> previous ce
Dear Viktor,
Thanks for your answer.
I Know that the current certificate is the old one, but this is because my
service is in production.
I tested new certificate this evening to limit the number of impacted
clients. And as it did not worked, i reinstalled previous certificate
waiting a solution
> On Dec 18, 2016, at 3:05 PM, Brice André wrote:
>
> I developped the service a few years ago and got wildcard certificates from
> Startcom. Due to the recent probems with startcom, I migrated my certificates
> to COMODO. I also tried to rationalise the number of certificates, and I
> think
Dear all,
I use a gsoap application for which I write the server (php/apache) and
client (gsoap and openssl). As I am pretty sure my problem comes from
openssl and not gsoap, I am asking my question here.
I developped the service a few years ago and got wildcard certificates from
Startcom. Due to
> Hello,
>
> I'm using an application (that I could recompile) which is using
> OpenSSL. My
> problem is that for some computers I have an internet access but no DNS
> server. In this case I configure the application to connect to
> https://xxx.xxx.xxx.xxx (ip address) instead of https://www.myDom
philipina wrote:
> Hello,
>
> I'm using an application (that I could recompile) which is using OpenSSL. My
> problem is that for some computers I have an internet access but no DNS
> server. In this case I configure the application to connect to
> https://xxx.xxx.xxx.xxx (ip address) instead of htt
in advance for your help.
Regards,
Alain
--
View this message in context:
http://www.nabble.com/How-to-disable-DNS-certificate-check--tp19367130p19367130.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
Charles B Cranston wrote:
NO! They are NOT the same. Look at the first few bytes:
> From the public key:
> Modulus (1024 bit):
> 00:cb:aa:35:d5:df:19:39:84:81:36:10:02:84:c3:
^^ ^^ ^^
> From the private key:
> modulus:
> 00:a6:16:30:78:ca:2e:39:27:32:c9:36:c0:16:55:
^^ ^^ ^^
Nope, this k
NO! They are NOT the same. Look at the first few bytes:
> From the public key:
> Modulus (1024 bit):
> 00:cb:aa:35:d5:df:19:39:84:81:36:10:02:84:c3:
^^ ^^ ^^
> From the private key:
> modulus:
> 00:a6:16:30:78:ca:2e:39:27:32:c9:36:c0:16:55:
^^ ^^ ^^
Nope, this key and cert do not match.
Charles Cranston wrote:
List the certificate: openssl x509 -noout -text -in
List the key: openssl rsa -noout -text -in
Make sure the fields in PublicKey (Modulus and Public Exponent)
match between the two.
Note that if private key is encrypted you will need to give
the password for t
List the certificate: openssl x509 -noout -text -in
List the key: openssl rsa -noout -text -in
Make sure the fields in PublicKey (Modulus and Public Exponent)
match between the two.
Note that if private key is encrypted you will need to give
the password for the openssl rsa above
War
Hi All,
I have a certificate and a key that don't seem to want to work together.
How can I verify that the combination is good?
The person who gave me the certificate tells me that the CSR was
genertated usign the key he's supplied, but I'm a little suspect because
all other key + cert combinat
13 matches
Mail list logo