x509\n");
return;
}
fclose(fp);
and verify it
rc= X509_verify(x,pubkey);
returns a 1 value now. done.
--
View this message in context:
http://openssl.6102.n7.nabble.com/verify-self-signed-x-509-tp45026p45034.html
Sent from the OpenSSL - User mailing list archive at Na
> 4) But the life of me cannot find how to set the public and verify?
Look for one of the openssl command-line programs that does what you want, and
then look at that code. In this case apps/verify.c might be useful.
/r$
--
Principal Security Engineer
Akamai Technology
Cambridge, MA
printf("read x509 nicely\n");
EVP_PKEY *pk;
if ((pk=EVP_PKEY_new()) == NULL){
fprintf(stderr,"err 1\n");
return;
}
--
View this message in context:
http://openssl.6102.n7.nabble.com/verify-self-signed-x-509-tp45026p45031.html
Sent from the OpenSSL - U
> How can this individual verify the x.509? I certainly do not want the
> receiving site to have private key; they are not the creator of such
> documents but simply the receiver for data. An excerpt of code would be most
> beneficial.
The certificate is signed with the PRIVATE key and verified
bble.com/verify-self-signed-x-509-tp45026.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopens