Ulf Moeller via RT wrote:
> The certificate encoding is in fact ok:
> 
> 2716    8:                   OBJECT IDENTIFIER qcStatements (1 3 6 1 5 5
> 7 1 3)
> 2726    1:                   BOOLEAN TRUE
> 2729   24:                   OCTET STRING, encapsulates {
> 2731   22:                     SEQUENCE {
> 2733   10:                       SEQUENCE {
> 2735    8:                         OBJECT IDENTIFIER
>          :                           pkixQCSyntax-v1 (1 3 6 1 5 5 7 11 1)
>          :                         }
> 2745    8:                       SEQUENCE {
> 2747    6:                         OBJECT IDENTIFIER
>          :                           etsiQcsCompliance (0 4 0 1862 1 1)
>          :                         }
>          :                       }
>          :                     }
>          :                   }
> 
> Google doesn't find the defintion of "etsiQcsCompliance", so I don't
> know what would be required to implement the extension.

in the isis-mtt context this extension is called "id-etsi-qcs-QcCompliance"
(see http://www.isis-mtt.t7-isis.org/ in case you have too much time to
waste ;-) .Afaik it simply means that the CA who issued the certificate
must be in compliance with ETSI TS 101 456 v1.1.1 ("Policy Requirements for
Certification Authorities Issuing Qualified Certificates").
As I have no real clue what to do with such an extension when verifying
a certificate I would simply ignore it.

Cheers,
Nils

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to