Hi Nils,
2007/3/9, Nils Larsch <[EMAIL PROTECTED]>:
Jordi Jaen Pallares wrote:
> File offset before reading : 0
> File offset after reading : 47
> Error in d2i_X509_fp...
> 10976:error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong
> tag:tasn_dec.c:1291:
> 10976:error:0D07803A:asn1 encod
Jordi Jaen Pallares wrote:
...
Anyway, I will need to extract (sooner or later) the respective EC keys
from the certificate,
use X509_get_pubkey() + EVP_PKEY_get1_EC_KEY() (note: both
function increase the reference count of the object)
...
[EMAIL PROTECTED]:~/Work/test$ ./opencert
Opened key
Dear Viktor,
thank you very much for the tip regarding the elliptic curve to use !
2007/3/8, Victor Duchovni <[EMAIL PROTECTED]>:
On Thu, Mar 08, 2007 at 02:41:46PM +0100, Jordi Jaen Pallares wrote:
> # openssl ecparam -name sect233r1 -out sect233r1.pem
You might do better with "prime256v1
On Thu, Mar 08, 2007 at 02:41:46PM +0100, Jordi Jaen Pallares wrote:
> Dear list,
>
> I am writing an application that uses ECC and certificates.
>
> At initialization time, the idea is to generate both a self-signed root
> certificate (as in the examples in the /demos examples) for the CA,
> an
Dear list,
I am writing an application that uses ECC and certificates.
At initialization time, the idea is to generate both a self-signed root
certificate (as in the examples in the /demos examples) for the CA,
and a set of long terms EC keys for each client.
In the program I intend to use both