At 10:03 PM 8/24/01 +0200, you wrote:
On Fri, Aug 24, 2001 at 05:28:43PM +0100, Andrew Cooke wrote:
What I should have asked is how to detect a *substitute* request. It will
be self-consistent, but will not match the correct private key.
One solution is to show that the certificate and
On Sat, Aug 25, 2001 at 07:41:08AM +0100, Andrew Cooke wrote:
How does she create the fingerprint? - I looked and could not find a way to
do it with openssl (only fingerprints for certificates seem to be supported).
openssl md5 filename
(or openssl sha1 fingerprint)
Best regards,
Damn! Thanks! I was looking at openssl req (because openssl x509 or
something similar does print a fingerprint).
With that, I can fix things...
Thanks again,
Andrew
At 08:50 AM 8/25/01 +0200, you wrote:
On Sat, Aug 25, 2001 at 07:41:08AM +0100, Andrew Cooke wrote:
How does she create the
Dear All,
I use openssl-0.9.6b. I want to encrypt the private key before outputing it, so I add the following item in my config file:
[req]
encrypt_key=yes
Then I type the "req" command to generate the key and request file.
openssl req -newkey rsa:1024 -keyout key.pem -out req.pem -config
On Fri, Aug 24, 2001 at 01:31:07PM -0700, Zhong Chen wrote:
I need to reuse the session in ssl client side, I plan to do following:
1. store a database of destinataion host name versus session id (use
LHASH)
2. retrieve the session id when user make a new connection based on host
name, then
Hi,
Is there a tool to convert pkcs12 (private)keyfile into a PEM keyfile?
Thanks,
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Bob Niederman wrote:
etcetera., where $srvr is 'http://servername.domain/file' or
'https://servername.domain/file'
Same general code works fileto the same boxes without proxy (different
route not requiring proxy).
Works fine for http, ethereal shows nothing leaving the box for https,
Yu Tang wrote:
Dear All,
I use openssl-0.9.6b. I want to encrypt the private key before
outputing it, so I add the following item in my config file:
[req]
encrypt_key=yes
Then I type the req command to generate the key and request file.
openssl req -newkey rsa:1024 -keyout
George Walsh wrote:
This has been one long battle, made messy later on by my having to work backward
from 0.6.6b to 0.9.6 in order to get a compile under UnixWare7.1.1
I have followed the advice Alex Pircher has kindly provided. Basically, that meant
following through the creation of
Hello -
I'm trying to use the Net::SSL perl module to do a simple
https request to PayPal.com. Everything seems to work
fine, except I get the following message embedded in
the response:
Client-SSL-Warning: Peer certificate not verified
Now, from how it looks, it is trying to tell me that
10 matches
Mail list logo