Hi Phil,
openssl is able to read the crl, output als follows (I changed the
URL/LDAP information):
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: /DC=tld/DC=domain/CN=test
Last Update: Mar 5 14:08:35 2011
On 08/03/11 13:01, Rudolph Bott wrote:
Tue Mar 8 13:09:48 2011 : Error: --> verify error:num=36:unhandled
critical CRL extension
This comes out of OpenSSL. OpenSSL can't parse your CRL.
You may need a newer version of OpenSSL; what does:
openssl crl -text -noout -in -inform pem
...say?
-
L
Hi List,
I've successfully setup the following scenario:
- Windows CA (Root-CA and Sub-CA)
- Cisco WLAN Controller + APs
- Windows 7 Domain Clients (+ Computer Certificates)
- EAP-TLS Auth with certificates
I created a small script to fetch the CRL from the CA and have it
converted to PEM for
3 matches
Mail list logo