On Fri, Aug 24, 2007, Bynum, Don wrote:

>  So, when I see a Friendly Name in the CA certs in a Trusted Root Store
> (in any browser for example), how did the friendly name get there?  A
> PKCS#12 file always includes the private key, right?  The private keys
> of Trusted Root CA certs are certainly not submitted to the browser
> vendor.
> 

A PKCS#12 files does not have to include a private key but it normally does
include at least one key. In the past browsers would reject a PKCS#12 file
without a key but now some will accept it.

In any case a friendlyName can be associated with a certificate other than the
one containing a private key (if any).

Also the actual browser vendor might associate a human readable name with the
certificate so when it is submitted a hard coded friendly name might appear.

So when a CA sends the CA it might send a certificate and tell the vendor call
this "Foobar Class 1 CA".

The third possibility is that in the absence of any other friendly name some
subject name components will be used but there's no standard way of doing that.
So if CN="Foo CA" and O="Bar Organization" the common name might be
"Foo CA - Bar Organization"

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to