ssl-certificate

convert pfx format to p12

旧时模样 提交于 2019-12-28 08:05:26
问题 I need to export a .pfx format certificate (from windows mmc) to .p12 to use in another application. I cant find a way to do this. Can anyone suggest a method? 回答1: .p12 and .pfx are both PKCS #12 files. Am I missing something? Have you tried renaming the exported .pfx file to have a .p12 extension? 回答2: I had trouble with a .pfx file with openconnect. Renaming didn't solve the problem. I used keytool to convert it to .p12 and it worked. keytool -importkeystore -destkeystore new.p12

convert pfx format to p12

 ̄綄美尐妖づ 提交于 2019-12-28 08:05:08
问题 I need to export a .pfx format certificate (from windows mmc) to .p12 to use in another application. I cant find a way to do this. Can anyone suggest a method? 回答1: .p12 and .pfx are both PKCS #12 files. Am I missing something? Have you tried renaming the exported .pfx file to have a .p12 extension? 回答2: I had trouble with a .pfx file with openconnect. Renaming didn't solve the problem. I used keytool to convert it to .p12 and it worked. keytool -importkeystore -destkeystore new.p12

create a pfx file from a .cer and a .pem file

╄→尐↘猪︶ㄣ 提交于 2019-12-28 05:51:28
问题 I have used openssl to create a .key and .cer file in pem format (you can read them). Now I want to create .pfx file from them. I have read openssl doumentation it says something like following command I can use openssl pkcs12 -export -in certificate.cer -inkey privateKey.key -out certificate.pfx -certfile CACert.cer but I don't know which one is my .cer file (certificate.cer or CACert.cer) what is differences between these two files? 回答1: The certificate.cer is your public key and the CACert

Java7 Refusing to trust certificate in trust store

不打扰是莪最后的温柔 提交于 2019-12-28 02:56:21
问题 I've a weird problem - a supplier uses TLS SSLv3 with both a self signed client and server certificate. This hasn't been a problem with Java1.5 and Java1.6 - simply import client certificate and private key into a keystore and the server public certificate into the truststore. Everything works fine. However with Java7 the server certificate fails to be trusted even though the same truststore is being used. I've tried Windows and Red Hat both using Java7 (1.7.03, 04 and 05, x86 and x64

Within a web browser, is it possible for JavaScript to obtain information about the HTTPS Certificate being used for the current page?

余生长醉 提交于 2019-12-27 22:18:51
问题 Is there a method for JavaScript running in a browser to determine which CA certificate is being used to authenticate the remote host for the browser's current HTTPS connection, and also obtain properties of that certificate, such as the name of the CA? If not, are there any other options for programatically obtaining this information, such as ActiveX, Java, CGI on the server side, ...? 回答1: You can use the opensource Forge project to do this. It implements SSL/TLS in JavaScript. You can make

Within a web browser, is it possible for JavaScript to obtain information about the HTTPS Certificate being used for the current page?

时光毁灭记忆、已成空白 提交于 2019-12-27 22:18:10
问题 Is there a method for JavaScript running in a browser to determine which CA certificate is being used to authenticate the remote host for the browser's current HTTPS connection, and also obtain properties of that certificate, such as the name of the CA? If not, are there any other options for programatically obtaining this information, such as ActiveX, Java, CGI on the server side, ...? 回答1: You can use the opensource Forge project to do this. It implements SSL/TLS in JavaScript. You can make

Third-Party Signed SSL Certificate for localhost or 127.0.0.1?

孤者浪人 提交于 2019-12-27 20:16:09
问题 Without divulging TOO much information, I need to setup a web server system that is intended to be used by end users all over the internet. the use case is such that: end users are (usually) in their homes behind their local firewalls when connecting to the system. The system consists of a remote server hosted by us, strictly over https (using SSL) The authorization mechanism requires user account self-creation on the remote server which, upon successful account creation, will then require a

PG::ConnectionBad: PQconsumeInput() SSL error: key values mismatch

↘锁芯ラ 提交于 2019-12-25 16:53:32
问题 When I open a certificate with OpenSSL::PKCS12, I lose the connection with my database and occur the error: PG::ConnectionBad: PQconsumeInput() SSL error: key values mismatch . I'm doing this: myuser@developer:~/myapp$ rails c 2.2.3 :001 > OpenSSL::PKCS12.new File.read('/local/to/mycert.pfx'), 'PASSWORD' => #<OpenSSL::PKCS12:0x000000072e6808 @key=#<OpenSSL::PKey::RSA:0x000000072e67e0>, @certificate=#<OpenSSL::X509::Certificate: subject=#<OpenSSL::X509::Name:0x000000072e6100>, issuer=#<OpenSSL

HttpWebRequest The request was aborted: Could not create SSL/TLS secure channel

岁酱吖の 提交于 2019-12-25 11:57:25
问题 I have deveoped asp.net web application and running it using iisexpress in local. I want to call webservice which require two wayssl. I have client certificate, installed in my local machine, given full control to Network_service, loggedin user using certificate mmc. Calling service using following code ServicePointManager.Expect100Continue = true; ServicePointManager.SecurityProtocol = SecurityProtocolType.Tls | SecurityProtocolType.Tls11 | SecurityProtocolType.Tls12 | SecurityProtocolType

Grant security to a private key in Windows Server 2012 via powershell w/out external DLLs, etc

送分小仙女□ 提交于 2019-12-25 09:26:24
问题 I'm trying to figure out how to grant security to a private key in Windows Server 2012 via powershell (v5). I've got an SSL certificate from LetsEncrypt, and need to use it for my email server, which relies on it being in the certificate store. I can successfully add the cert, but can't quite figure out how to grant security to the private key. Of course, doing manually via GUIs everything works fine, but I want to automate using powershell scripts so renewal is lights-out easy. With a PS