First, initialize the library and make sure you have the ability to
understand any errors you might encounter during debugging. Call
SSL_library_init() and SSL_load_error_strings().
Make sure that you provide a suitably random seed for the random
number generator. Call RAND_load_file() on /dev/r
You have the public key there. It is in PEM-encoded DER format.
You did not use the public key to generate the CSR. You included the
public key in the CSR, but you used that public key's private key to
generate the CSR.
If you have lost that *private* key, your public key is worthless.
Note tha
Le Mercredi 10 Février 2010 12:32:50, vous avez écrit :
> Hi,
>
> I have lost my public key, I used this public key to generate a certificate
> request which has been signed. I need to try and recover my key to a .p12
> file and reimport it into my program to match the signed cert.
>
> All I have
Hi,
I have lost my public key, I used this public key to generate a certificate
request which has been signed. I need to try and recover my key to a .p12
file and reimport it into my program to match the signed cert.
All I have to work with is my key is the format -BEGIN PUBLIC
KEY-MIG
I'm curious why does SSL_get_error() need to be passed a return code
to function? The call sig being
int SSL_get_error(const SSL *ssl, int ret);
I'm referring to the second argument. I just can't imagine what that
might possibly be for, but I'm extremely, anybody have any ideas?
-Patrick
P.S.
I
Hello -
I am writing a client program. I have a x509 certificate and a key pair. The
server needs to authenticate the client. What is the sequence of openssl calls
I need to make to pass the server my information. I see so many different
functions such as SSL_CTX_use_certificate versus SSL
On Wed, Feb 10, 2010 at 4:23 AM, Dr. Stephen Henson wrote:
> On Tue, Feb 09, 2010, skillz...@gmail.com wrote:
>
>> I'm trying to programmatically verify that a certificate from a sub-CA
>> is signed by a specific root CA. I get an error of 7
>> (X509_V_ERR_CERT_SIGNATURE_FAILURE) from X509_verify_
On Wed, Feb 10, 2010 at 12:49 PM, Samuel123smith
wrote:
>
> Hi ALL,
>
> I am trying to use openssl pkcs11 engine . I have more than pkcs11 provider
> and I want my customer to specify which pkcs11 provider they want to use .
> For this I am thinking to modify the openssl.cnf file and
> have one op
On Tue, Feb 9, 2010 at 5:22 PM, Dr. Stephen Henson wrote:
> Hmm that error indicates a problem elsewhere in the configuration file. I
> tried today's snapshot and it worked fine.
>
> I've improved the error logging for that code now. Either try tomorrow's
> snapshot, current cvs HEAD or just apply
On Tue, Feb 09, 2010, skillz...@gmail.com wrote:
> I'm trying to programmatically verify that a certificate from a sub-CA
> is signed by a specific root CA. I get an error of 7
> (X509_V_ERR_CERT_SIGNATURE_FAILURE) from X509_verify_cert. If I verify
> with the openssl command line tool using 'open
Hi ALL,
I am trying to use openssl pkcs11 engine . I have more than pkcs11 provider
and I want my customer to specify which pkcs11 provider they want to use .
For this I am thinking to modify the openssl.cnf file and
have one option
pkcs11_lib32=/usr/lib/pkcs11/opencryptoki.so
pkcs11_lib64=/usr
Hi ALL,
I am trying to use openssl pkcs11 engine . I have more than pkcs11 provider
and I want my customer to specify which pkcs11 provider they want to use .
For this I am thinking to modify the openssl.cnf file and
have one option
pkcs11_lib32=/usr/lib/pkcs11/opencryptoki.so
pkcs11_lib64=/usr
12 matches
Mail list logo