Viktor,
Thank you for this in-depth explanation.
I have talked to a number of large potential customers where certs are
important but they are highly constrained. This includes the auto
sector with ECUs that are really pressed to the wall (like on the engine
block and already running at 130C
Want to continue this thread but with new information. I built a
Fedora-arm 26 system (on a Cubieboard2) and it has openssl version 1.1.0f
I built my DER root cert (and private key) no problem.
I built my DER Intermediate cert private key and CSR no problem.
For the following command:
sn=8
f
I understand that the trusted store must include Intermediate CA 1 or
remove Intermediate CA 2 and just have the Root CA in it. I was trying
things out to understand how client authentication works.
Regards,
Sudarshan
On Tue, Aug 22, 2017 at 10:37 AM, Sudarshan Raghavan <
sudarshan.t.ragha...@gma
This is the CA - Leaf hierarchy I am testing with
Root CA > Intermediate CA 1 > Intermediate CA 2 > Leaf
Trusted certificates configured: Root CA and Intermediate CA 2
Client authenticates itself with this chain: Leaf > Intermediate CA 2 >
Intermediate CA 1
I am using openssl 1.1.0f. This clien
> And the manpages should say things like “any supported digest” and such.
The picture is a lot more complex I'm sorry to say...
You’re right. Thanks.
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
On 08/22/2017 10:53 AM, Salz, Rich via openssl-users wrote:
> SHA256 is not listed as a valid hash.
Many more X.509 digest algorithms are supported in this context
than (sadly) are listed in the manpage. Perhaps there should
be a command that lists all supported x.509 hash
Hi! I’m a hobbiest developer. I’m trying to execute this command using C
functions in objective C. The output using this subcommand and its functions
are very different. I’d been reading the open source smime.c file but I don’t
understand where is my mistake. Nevertheless I don’t know where I ca
> On Aug 22, 2017, at 10:53 AM, Salz, Rich via openssl-users
> wrote:
>
> Fixed in 1.1.0 and later; “list—digest-algorithms” command.
For the record: "openssl list -digest-algorithms", the "ndash" above
is a typo of some sort...
It is not clear to me how to get a list of digest algorithms tha
> > SHA256 is not listed as a valid hash.
>Many more X.509 digest algorithms are supported in this context
>than (sadly) are listed in the manpage. Perhaps there should
> be a command that lists all supported x.509 hash algorithms,
>and the documentation for commands that take
> On Aug 21, 2017, at 9:02 PM, Robert Moskowitz wrote:
>
> openssl x509 -req -days 3650 -extensions v3_intermediate_ca -inform $format\
> -in $dir/csr/intermediate.csr.$format -outform $format -out
> $dir/certs/intermediate.cert.$format\
> -CAkeyform $format -CAkey $cadir/private/ca.key.$format
Hi! I’m a hobbiest developer. I’m trying to execute this command using C
functions in objective C. The output using this subcommand and its functions
are very different. I’d been reading the open source smime.c file but I don’t
understand where is my mistake. Nevertheless I don’t know where I ca
Hi! I’m a hobbiest developer. I’m trying to execute this command using C
functions in objective C. The output using this subcommand and its functions
are very different. I’d been reading the open source smime.c file but I don’t
understand where is my mistake. Nevertheless I don’t know where I ca
12 matches
Mail list logo