> From: owner-openssl-us...@openssl.org On Behalf Of Thomas Koeller
> Sent: Thursday, 07 February, 2013 15:54
> On Thursday 07 February 2013 07:31:55 you wrote:
> > On Wed, February 6, 2013 23:47, Thomas Koeller wrote:
> > > bash-4.0$ openssl verify -x509_strict -CAfile cacert/root_ca.pem
> > > -
On Thursday 07 February 2013 07:31:55 you wrote:
> On Wed, February 6, 2013 23:47, Thomas Koeller wrote:
> > bash-4.0$ openssl verify -x509_strict -CAfile cacert/root_ca.pem -purpose
> > sslserver cacert/host_ca.pem
> > cacert/host_ca.pem: C = DE, ST = Hamburg, O = K\C3\B6ller Family, OU =
> > K\C3
On Wed, February 6, 2013 23:47, Thomas Koeller wrote:
> bash-4.0$ openssl verify -x509_strict -CAfile cacert/root_ca.pem -purpose
> sslserver cacert/host_ca.pem
> cacert/host_ca.pem: C = DE, ST = Hamburg, O = K\C3\B6ller Family, OU =
> K\C3\B6ller Family Certification Authority, CN = K\C3\B6ller F
Hi,
I am trying to create a certificate chain that I intend to use for signing
SSL/TLS host certificates. The chain consists of a self-signed
root certificate, and an intermediate certificate which will be used to sign
the actual server certificates.
The root certificate looks like this:
bash