We updated above proxy using our public key and private key to encrypt and decrypt. if you could post the STRUCTURE of your private key, that might help us.īut maybe better is to just insure that your private key looks exactly like the demo key.Īlso: just a side question, how did you create your own private key? What did you do, to generate that private key? Where did you get it? The security of the encryption depends on it remaining a secret. It's a secret, it's intended to be a secret. I do not suggest that you post your private key here. HHYu+QiRZnABbpD9C1+Akh4dG97Woyfd5igBsT1Ovs9PDCN0rO4I2nJHrNLJSPte Your private key should look something like this: -BEGIN PRIVATE KEY. That message indicates the private key is not correctly formatted. The important thing is the message it is giving you. By comparing you may be able to see what is different. Indicates that the private key you are using, is malformed.Ĭompare it to the formats of the keys I included in the demonstration.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |