Jakob,
You make a good point. In fact, after some reflection, there is
probably no reason for the device to store more than the 96 bytes of
keyvalue in secure store. If some format is needed to use the key, that
can be done at that time. This is for the case where the device
supports only
On 08/23/2017 03:52 PM, Jakob Bohm wrote:
On 22/08/2017 22:26, Robert Moskowitz wrote:
Want to continue this thread but with new information. I built a
Fedora-arm 26 system (on a Cubieboard2) and it has openssl version
1.1.0f
I built my DER root cert (and private key) no problem.
I built
On 22/08/2017 22:26, Robert Moskowitz wrote:
Want to continue this thread but with new information. I built a
Fedora-arm 26 system (on a Cubieboard2) and it has openssl version 1.1.0f
I built my DER root cert (and private key) no problem.
I built my DER Intermediate cert private key and CSR n
Viktor,
Thank you for this in-depth explanation.
I have talked to a number of large potential customers where certs are
important but they are highly constrained. This includes the auto
sector with ECUs that are really pressed to the wall (like on the engine
block and already running at 130C
Want to continue this thread but with new information. I built a
Fedora-arm 26 system (on a Cubieboard2) and it has openssl version 1.1.0f
I built my DER root cert (and private key) no problem.
I built my DER Intermediate cert private key and CSR no problem.
For the following command:
sn=8
f
> And the manpages should say things like “any supported digest” and such.
The picture is a lot more complex I'm sorry to say...
You’re right. Thanks.
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
On 08/22/2017 10:53 AM, Salz, Rich via openssl-users wrote:
> SHA256 is not listed as a valid hash.
Many more X.509 digest algorithms are supported in this context
than (sadly) are listed in the manpage. Perhaps there should
be a command that lists all supported x.509 hash
> On Aug 22, 2017, at 10:53 AM, Salz, Rich via openssl-users
> wrote:
>
> Fixed in 1.1.0 and later; “list—digest-algorithms” command.
For the record: "openssl list -digest-algorithms", the "ndash" above
is a typo of some sort...
It is not clear to me how to get a list of digest algorithms tha
> > SHA256 is not listed as a valid hash.
>Many more X.509 digest algorithms are supported in this context
>than (sadly) are listed in the manpage. Perhaps there should
> be a command that lists all supported x.509 hash algorithms,
>and the documentation for commands that take
> On Aug 21, 2017, at 9:02 PM, Robert Moskowitz wrote:
>
> openssl x509 -req -days 3650 -extensions v3_intermediate_ca -inform $format\
> -in $dir/csr/intermediate.csr.$format -outform $format -out
> $dir/certs/intermediate.cert.$format\
> -CAkeyform $format -CAkey $cadir/private/ca.key.$format
10 matches
Mail list logo