Related
Jesse Wilson I can establish a TLS connection to https://google.com/ . The remote service returns a chain of 3 certificates: CN=www.google.com, O=Google Inc, L=Mountain View, ST=California, C=US CN=Google Internet Authority G2, O=Google Inc, C=US CN=GeoTrust G
Thor I'm building some .net code that will run unattended on one of our servers. Part of its execution requires it to execute a Java executable that communicates with certain web resources and services over SSL. If Java does something over SSL and doesn't have
Tim: When enumerating AuthRootand CertificateAuthoritiesX509 store, I can't find the self-signed SSL certificate imported on my Trusted Root Certification Authoritieslocal machine : X509Store store = new X509Store(StoreName.AuthRoot); // also tried St
Tim: When enumerating AuthRootand CertificateAuthoritiesX509 store, I can't find the self-signed SSL certificate imported on my Trusted Root Certification Authoritieslocal machine : X509Store store = new X509Store(StoreName.AuthRoot); // also tried St
Gardo In a shell script, I want to verify the x509 certificate with openssl to make sure it's valid and signed by one of my root CAs. I tried this: openssl verify -CAfile /path/to/CAfile mycert.pem
It works, but for self-signed certificates I get the output:
Gardo In a shell script, I want to verify the x509 certificate with openssl to make sure it's valid and signed by one of my root CAs. I tried this: openssl verify -CAfile /path/to/CAfile mycert.pem
It works, but for self-signed certificates I get the output:
Tim: When enumerating AuthRootand CertificateAuthoritiesX509 store, I can't find the self-signed SSL certificate imported on my Trusted Root Certification Authoritieslocal machine : X509Store store = new X509Store(StoreName.AuthRoot); // also tried St
Gardo In a shell script, I want to verify the x509 certificate with openssl to make sure it's valid and signed by one of my root CAs. I tried this: openssl verify -CAfile /path/to/CAfile mycert.pem
It works, but for self-signed certificates I get the output:
Gardo In a shell script, I want to verify the x509 certificate with openssl to make sure it's valid and signed by one of my root CAs. I tried this: openssl verify -CAfile /path/to/CAfile mycert.pem
It works, but for self-signed certificates I get the output:
Gardo In a shell script, I want to verify the x509 certificate with openssl to make sure it's valid and signed by one of my root CAs. I tried this: openssl verify -CAfile /path/to/CAfile mycert.pem
It works, but for self-signed certificates I get the output:
Simon Pearson I'm trying to validate an X509 certificate chain without importing the root CA certificate into the trusted root CA certificate store (in production this code will run in an Azure Function and you can't add a certificate to the trusted root CA ce
architect In my example, there are three certificates, let's say they form a chain, but I don't yet know which of them is signed: X509Certificate c1 = ....
X509Certificate c2 = ....
X509Certificate c2 = ....
I would like to know which certificate is responsib
Kedour I have two .pem files for a certificate (certificate and RSA private key). I am getting an openSSL certificate object X509from a server . How should I compare these two certificates to make sure they are the same or different? Pepper The DER representat
Kedour I have two .pem files for a certificate (certificate and RSA private key). I am getting an openSSL certificate object X509from a server . How should I compare these two certificates to make sure they are the same or different? Pepper The DER representat
Kedour I have two .pem files for a certificate (certificate and RSA private key). I am getting an openSSL certificate object X509from a server . How should I compare these two certificates to make sure they are the same or different? Pepper The DER representat
architect In my example, there are three certificates, let's say they form a chain, but I don't yet know which of them is signed: X509Certificate c1 = ....
X509Certificate c2 = ....
X509Certificate c2 = ....
I would like to know which certificate is responsib
Kedour I have two .pem files for a certificate (certificate and RSA private key). I am getting an openSSL certificate object X509from a server . How should I compare these two certificates to make sure they are the same or different? Pepper The DER representat
architect In my example, there are three certificates, let's say they form a chain, but I don't yet know which of them is signed: X509Certificate c1 = ....
X509Certificate c2 = ....
X509Certificate c2 = ....
I would like to know which certificate is responsib
Kedour I have two .pem files for a certificate (certificate and RSA private key). I am getting an openSSL certificate object X509from a server . How should I compare these two certificates to make sure they are the same or different? Pepper The DER representat
Omar Amalfi Hi I want to generate certificate chain using c#. Something like this: I created this code for generation: using System;
using System.Security.Cryptography;
using System.Security.Cryptography.X509Certificates;
namespace CC.CertificateCore
{
pu
Brain powder Main goal I'm trying to find a way to add licenses to users using ubuntu linux; via powershell or any other programmable method. My last resort is to use selenium in python. Actual Problem I'm trying to use a cmdlet with a certificate for Connect-
Caio Lins So I'm trying to manually validate a request for an Alexa skill I'm developing, but can't "verify that all certificates in the chain are combined to create a chain of trust to a trusted root CA certificate". As shown in step 3.c of the documentation
Caio Lins So I'm trying to manually validate a request for an Alexa skill I'm developing, but can't "verify that all certificates in the chain are combined to create a chain of trust to a trusted root CA certificate". As shown in step 3.c of the documentation
Caio Lins So I'm trying to manually validate a request for an Alexa skill I'm developing, but can't "verify that all certificates in the chain are combined to create a chain of trust to a trusted root CA certificate". As shown in step 3.c of the documentation
Caio Lins So I'm trying to manually validate a request for an Alexa skill I'm developing, but can't "verify that all certificates in the chain are combined to create a chain of trust to a trusted root CA certificate". As shown in step 3.c of the documentation
Caio Lins So I'm trying to manually validate a request for an Alexa skill I'm developing, but can't "verify that all certificates in the chain are combined to create a chain of trust to a trusted root CA certificate". As shown in step 3.c of the documentation
no data
Kiren Siva: I have a SOAP server. The SOAP request received on the server has the ws security header . Following is the main node of the request XML. BinarySecurityToken (X509PKIPathv1 certificate) summary method summary value Signature value SecurityTokenRefe
Driss Amri I'm trying to handle X509 certificates in several steps and have run into two issues. I'm new to JCE so I'm not fully up to date yet. We want to be able to parse several different X509 certificates based on different encodings (PEM, DER and PCKS7).