> From: owner-openssl-us...@openssl.org On Behalf Of Llenlleawg
> Sent: Saturday, 12 December, 2009 15:17

> Here is a brief outline of what I'm trying to do.  I'm trying 
> to create a
> certificate signed by my own CA and private key.
> 
> I followed the steps on the following site to setup my own CA. 
> 
> http://www.mobilefish.com/developer/openssl/openssl_quickguide
> _create_ca.html
> 
> and then followed the steps on this page to try to create the 
> certificate.
> 
> http://www.mobilefish.com/developer/openssl/openssl_quickguide
> _ca_certificate.html
> 
> My problem is when I get to step 7 on the second page.  I receive the
> following error when I run the command in step 7.
> 
> C:\OpenSSL\bin>openssl rsa < newreq.pem > newkey.pem
> unable to load Private Key
> 6068:error:0906D06C:PEM routines:PEM_read_bio:no start
> line:.\crypto\pem\pem_lib.c:650:Expecting: ANY PRIVATE KEY
> 

They appear to have been confused/misled and not tested.

Some older versions of 'CA.pl newreq' (and newreq-nodes), 
in particular 0.9.7d which they identify and I happen to have 
to hand on an old system, incorrectly says at the end:
  Request (and private key) is in newreq.pem

but in fact the request is in newreq.pem and the privkey 
is in newkey.pem. As they should be, because a CSR does not, 
and in general for security MUST not, contain the privkey.

If you just skip their step 7 it looks like it should work.

Aside: their description at the top of the page isn't quite 
correct. Assuming kRSA, as they apparently do, the browser
(client) doesn't choose and send the actual sessionkey, 
rather the premaster secret which is used to derive the 
sessionkeys (there are actually two, encryption and MAC).



______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to