static bool IsCACertificate(X509* cert)
{
// (U) Initialize to false.
bool bRetVal = false;
BASIC_CONSTRAINTS* bsCA =
(BASIC_CONSTRAINTS*)X509_get_ext_d2i(cert, NID_basic_constraints,
NULL, NULL);
if (bsCA)
{
// (U) Could be a CA
ing a
PKCS12 with CRLs and success in parsing that PKCS12.
Again, thanks for looking at this and validating what I have been
thinking and feeling about putting CRLs into PKCS12s.
-Rick
On Mon, Nov 14, 2016 at 2:11 PM, Dr. Stephen Henson wrote:
> On Wed, Nov 02, 2016, Richard Stanek wrote:
My original requirements were to extract the user certificate, the
private key, and the CAs. For that I was using the call to
PKCS12_parse(...). This satisfied the original requirements. Very
easy to find, understand, and use.
The new requirements that I have are that I also need to extract a C