Hi,
first check if your existing cert is allowed to act as a CA cert. Print
the
cert details with "openssl x509 -text -in <your cert.pem>". If your
cert is
not yet in PEM format, add "-inform DER" to the above. In the resulting
output
check for lines like these:
X509v3
extensions:
X509v3 Basic Constraints: CA:FALSE If you find the line "CA:FALSE" (which is most likely) then your cert can
only
be used as a server or client cert. You then could still use it for
signing if
you change openssl internaly to ignore this extension, but you would
violate
the x509 standard and every proper coded application would refuse to use
the
resulting certificates.
Best Regards,
Reiner.
|