> https://www.openssl.org/docs/apps/x509v3_config.html#ARBITRARY-
> EXTENSIONS
Oops.
I on ly looked at asn1_generate. Should there be a cross-link?
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
On Mon, Apr 20, 2015, Salz, Rich wrote:
> > > A patch to let you specify the DER directly would be useful.
> >
> > No patch required:
>
> Looks like a doc bug then.
Err...
https://www.openssl.org/docs/apps/x509v3_config.html#ARBITRARY-EXTENSIONS
Steve.
--
Dr Stephen N. Henson. OpenSSL project
> > A patch to let you specify the DER directly would be useful.
>
> No patch required:
Looks like a doc bug then.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
On Mon, Apr 20, 2015, Salz, Rich wrote:
> > How do we use `openssl req` and a CONF file to add the information
> > (assuming we already have the certified timestamps)?
>
> Ouch, that's gonna be nasty. Look at ASN1_generate_nconf.pod Most likely
> have to use the SEQUENCE type, recursively. Ou
On Mon, Apr 20, 2015 at 01:57:47PM +, Salz, Rich wrote:
> > How do we use `openssl req` and a CONF file to add the information
> > (assuming we already have the certified timestamps)?
>
> Ouch, that's gonna be nasty. Look at ASN1_generate_nconf.pod Most likely
> have to use the SEQUENCE ty
> How do we use `openssl req` and a CONF file to add the information
> (assuming we already have the certified timestamps)?
Ouch, that's gonna be nasty. Look at ASN1_generate_nconf.pod Most likely have
to use the SEQUENCE type, recursively. Ouch indeed.
A patch to let you specify the DER dire
Browsers are starting to enforce Certificate Transparency (CT).
Below is a sample of CT Precertificate SCTs, which is required for CT.
It includes a new certificate extension with an OID of
1.3.6.1.4.1.11129.2.4.2.
How do we use `openssl req` and a CONF file to add the information
(assuming we al