Yeah, now I just have to figure out how to parse the X509 Extension data from the certificate to pull out the SubjectAltName information.... :-)
There wouldn't be a snippet of code laying around somewhere that does that given a X509 cert as input would there? It looks a bit arcane.... On 1/10/2016 21:04, Judson Wilson wrote: > It's always good to start with the s_client and s_server programs for > incrementally verifying compatibility in your new programs. Those > would have failed on your certificates, alerting you it's not a > program problem. > > <https://mta.openssl.org/mailman/listinfo/openssl-users> > > > > > _______________________________________________ > openssl-users mailing list > To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users -- Karl Denninger k...@denninger.net <mailto:k...@denninger.net> /The Market Ticker/ /[S/MIME encrypted email preferred]/
smime.p7s
Description: S/MIME Cryptographic Signature
_______________________________________________ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users