On Sat 2019-06-01 12:14:00 +0200, Uwe Brauer wrote:
> In any case I finally solveed the issue by just importing all available
> cer into gpgsm and it worked, by mistake was to assume that gpgsm uses
> the ones which are installed system wide.
I agree that gpgsm integration with the system keyring
>>> "WT" == Wolfgang Traylor writes:
>> However given a cer file, how can I find out its fingerprint?
> This command will show you the details of the certificates from the website[1]
> you mentioned including its fingerprint:
> openssl x509 -noout -text -fingerprint -inform DER -in
> However given a cer file, how can I find out its fingerprint?
This command will show you the details of the certificates from the website[1]
you mentioned including its fingerprint:
openssl x509 -noout -text -fingerprint -inform DER -in downloaded_key_file.cer
Or you import the key with `gpgsm
Hello Uwe Brauer,
> I installed all its root certificates in
> /usr/share/ca-certificates/Spain
I usually put the fingerprint of the root certificate in ~/.gnupg/trustlist.txt
like this:
```
# CN=COMODO RSA Certification Authority
# O=COMODO CA Limited
# L=Salford
# ST=Greater Manchester
#
Hi
I am not sure that my email arrived via gmane.
I received an smime signed email from a colleague. It contains a public
key from
https://www.sede.fnmt.gob.es/descargas/certificados-raiz-de-la-fnmt
Basically the Spanish government.
I installed all its root certificates in