Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

selfssl.exe create public/private .pem

Posted on 2012-03-29
2
Medium Priority
?
1,097 Views
Last Modified: 2012-04-06
Hi All,

I want to create a base64 .pem public and private hash using selfssl.exe
0
Comment
Question by:detox1978
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 30

Accepted Solution

by:
Brad Howe earned 2000 total points
ID: 37794514
That is not possible with SELFSSL. You will need to use OpenSSL for windows.

selfssl /?
SELFSSL [/T] [/N:cn] [/K:key size] [/S:site id] [/P:port]
 /T Adds the self-signed certificate to “Trusted Certificates”  list.  
/N:cn Specifies the common name of the certificate. The computer name is used if not specified.
 /K:key size Specifies the key length. Default is 1024.
 /V:validity days Specifies the validity of the certificate. Default is 7 days.
 /S:site id Specifies the id of the site. Default is 1 (Default Site).
 /P:port Specifies the SSL port. Default is 443.
 /Q Quiet mode. You will not be prompted when SSL settings are overwritten.

 The default behaviour is equivalent with:
 selfssl.exe /N:CN=LAP4015 /K:1024 /V:7 /S:1 /P:443

For example;

openssl genrsa -out yout_private_key.pem 1024
openssl rsa -in yout_private_key.pem -out public_key.pem -outform PEM -pubout

NOTE: openssl private keys contain pubic keys too. The second command is to just extract it.


Cheers,
Hades666
0
 
LVL 2

Author Closing Comment

by:detox1978
ID: 37817656
thanks
0

Featured Post

Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
A phishing scam that claims a recipient’s credit card details have been “suspended” is the latest trend in spoof emails.
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question