Yeah, now I just have to figure out how to parse the X509 Extension data
from the certificate to pull out the SubjectAltName information.... :-)

There wouldn't be a snippet of code laying around somewhere that does
that given a X509 cert as input would there?  It looks a bit arcane....

On 1/10/2016 21:04, Judson Wilson wrote:
> It's always good to start with the s_client and s_server programs for
> incrementally verifying compatibility in your new programs.  Those
> would have failed on your certificates, alerting you it's not a
> program problem.
>
>     <https://mta.openssl.org/mailman/listinfo/openssl-users>
>
>
>
>
> _______________________________________________
> openssl-users mailing list
> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

-- 
Karl Denninger
k...@denninger.net <mailto:k...@denninger.net>
/The Market Ticker/
/[S/MIME encrypted email preferred]/

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to