Search results

From OpenSSLWiki
Jump to navigationJump to search

Page title matches

  • * Before giving birth to a certificate you need to create its DNA... a public/private key pair. * Once this DNA is created you need some Certificate Authority to certify that you are the owner of this DNA.
    3 KB (539 words) - 20:49, 25 May 2013

Page text matches

  • * Before giving birth to a certificate you need to create its DNA... a public/private key pair. * Once this DNA is created you need some Certificate Authority to certify that you are the owner of this DNA.
    3 KB (539 words) - 20:49, 25 May 2013
  • Default usage in HTTPS is to verify server authenticity with trusted Certificate Authorities known by the browser. ...that serves multiple domains but doesn't have a wildcard certificate or a certificate containing a full list of supported domains.
    10 KB (1,499 words) - 16:23, 27 June 2017
  • ...</tt> to retrieve error information. If you are validating a connection or certificate, you will use <tt>SSL_get_error</tt>, <tt>SSL_get_verify_result</tt>, or <t
    2 KB (373 words) - 17:29, 24 March 2013
  • ...s|openssl commands]]. A beginners introduction to certificates is on the [[Certificate Lifecycle]] page.
    896 bytes (122 words) - 18:38, 14 October 2015
  • ...enSSL is to assume that OpenSSL will validate the hostname in the server's certificate. Versions prior to 1.0.2 did not perform hostname validation. Version 1.0 * Tries to find a match for hostname in the certificate's Common Name field.
    11 KB (1,531 words) - 19:15, 28 April 2018
  • If you want to detect the flags after reading a key or certificate from disk, then use the following code: ...e certificate on the left can be used with SSL server using ECDSA, but the certificate on the right cannot because it will result in 0x1408a0c1 at the server.
    10 KB (1,677 words) - 12:25, 10 March 2014
  • ...rt, X509 * x509_cert) file result is the raw DER-encoded value of the X509 Certificate. Since it is an X509 certificate the best way to view content is:
    6 KB (693 words) - 23:23, 14 January 2022
  • * The new ciphersuites are defined differently and do not specify the certificate type (e.g. RSA, DSA, ECDSA) or the key exchange mechanism (e.g. DHE or ECDH ...n now have extensions (this has an impact on the custom extension APIs and Certificate Transparency)
    21 KB (3,497 words) - 13:46, 28 March 2022
  • ...th 'FireDaemon Technologies Limited' Extended Validation (EV) code signing certificate. ...lly. Algorithm support matches that as listed on the wolfCrypt FIPS 140-2 certificate #3389.
    7 KB (1,081 words) - 07:30, 11 April 2024
  • /* Step 1: verify a server certificate was presented during the negotiation */ '''<tt>SSL_CTX_load_verify_locations</tt>''' loads the certificate chain for the <tt>random.org</tt> site. The site's CA is Comodo, and the ch
    24 KB (3,955 words) - 15:33, 12 December 2022
  • ...er in the certificate, and the CA then signs the certificate. That is, the certificate contains the Diffie-Hellman public-key parameters, and those parameters nev
    9 KB (1,422 words) - 14:34, 13 February 2021
  • The RSA key in the certificate has to be of suitable size and certificate signing restrictions.
    21 KB (3,420 words) - 08:32, 2 February 2024
  • If you want to detect the flags after reading a key or certificate from disk, then use the following code: ...e certificate on the left can be used with SSL server using ECDSA, but the certificate on the right cannot because it will result in 0x1408a0c1 at the server.
    18 KB (3,074 words) - 02:26, 29 July 2019
  • ...s/tlspretense TLSPretense] || A test framework for testing SSL/TLS client certificate validation
    7 KB (964 words) - 18:13, 6 July 2015
  • ...the server's certificate. If you use a 2048-bit RSA prime in the server's certificate, then use a 2048-bit Diffie-Hellman group for key agreement.
    13 KB (2,037 words) - 20:55, 12 May 2021
  • ...ient it is connecting to. The context is then configured by specifying the certificate and private key to use.
    6 KB (908 words) - 13:16, 8 November 2022
  • ...nerate such certificates and private key pairs. Later on we will need that certificate file to test our ECDSA methods. ...l be a lot of 3s, exactly as many as the length of the public key. In our certificate file we use a brainpoolP384r1 curve as well as for the ECDH. Beware that th
    33 KB (4,951 words) - 08:57, 7 March 2019
  • ...onment variable is not specified, a default file is created in the default certificate storage area called '''openssl.cnf'''. The settings in this default configu |style="padding: 4px;" | Certificate Authority (CA) Management.
    35 KB (5,360 words) - 11:56, 24 June 2022
  • ...te [https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/1747 #1747] in mid-2012. This 2.0 FIPS module is compatible with OpenSSL r ...to [https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/2398 #2398] (which is at 2.0.13 as of September 2016).
    19 KB (2,634 words) - 10:25, 20 October 2022
  • ...Using-Windows-certificate-store-through-OpenSSL-td46788.html Using Windows certificate store through OpenSSL] on the OpenSSL developer list.
    35 KB (5,320 words) - 13:58, 16 April 2021

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)