Thanks, Ted and Richard, especially for going to the effort of
deciphering my English.

(One of these days I'll learn how to type fast and be lucid at the same
time.)

On the question of using certificates to sign vs. using keys to sign,
could I ask for one more clarification -- 

If, for the sake of argument, I made a key for CA use, signed
certificates for servers with it, and then made the CA's certificate,
are the certificates signed when only the key existed going to be valid?
And are they going to be identical to certificates signed afterwards,
other than entropy?

I don't want to do this, it's just the quickest way I can think of to
ask about the mechanical interdependencies.

--
Joel Rees   <[EMAIL PROTECTED]>
digitcom, inc.   株式会社デジコム
Kobe, Japan   +81-78-672-8800
** <http://www.ddcom.co.jp> **

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to