Original Message-
>>From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Chong Peng
>>Sent: Thursday, February 09, 2006 5:36 PM
>>To: openssl-users@openssl.org
>>Subject: RE: Hard-coded keys and cert in the image
>>
>>
>>forget one thing, after
rivateKey(bio, NULL, ctx->default_passwd_callback,
>ctx->default_passwd_callback_userdata);
>
>
>Thanks,
>-Grace
>-Original Message-
>From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Chong Peng
>Sent: Thursday, February 09, 2006 5:36 PM
>To: openssl-users@openssl
2006 5:36 PM
To: openssl-users@openssl.org
Subject: RE: Hard-coded keys and cert in the image
forget one thing, after you have the private key (of type EVP_PKEY) and
certificate (of type X509, you use:
SSL_CTX_use_certificate(ctx,cert) and SSL_CTX_use_PrivateKey(ctx, pkey)
to read them i
On Sat, Feb 11, 2006, Alberto Alonso wrote:
> What would be the equivalent to do the root certificate to
> be used during validation?
>
> Basically the next step for me is not having to have the
> SSL_CTX_load_verify_locations call.
>
> The SSL_CTX_set_cert_store seems to be what I want, but I d
What would be the equivalent to do the root certificate to
be used during validation?
Basically the next step for me is not having to have the
SSL_CTX_load_verify_locations call.
The SSL_CTX_set_cert_store seems to be what I want, but I don't
find documentation on how to create the store in the f
, 2006 5:25 PM
To: openssl-users@openssl.org
Subject: RE: Hard-coded keys and cert in the image
grace:
i believe what your are trying to do is what i did a few days ago. here is how
you do it:
1. obtain the private key and certificate in "pem" format, e.g., by using the
following opens
On Thu, Feb 09, 2006, Xie Grace Jingru-LJX001 wrote:
>
> If the privkey and cacert have to be hard-coded in the image (by using
> #define), how can I tell SSL to look into these constants for the key and
> cert instead of the default directory? Which SSL routine I need to change to
> let SSL know
grace:
i believe what your are trying to do is what i did a few days ago. here is how
you do it:
1. obtain the private key and certificate in "pem" format, e.g., by using the
following openssl command:
$ openssl genrsa -out key.pem 1024
$ openssl req -new -key key.pem -out request.pem
$ openss