Hello,
> On Saturday 26 May 2007 21:38, Victor Duchovni wrote:
> > On Sat, May 26, 2007 at 10:11:08PM +0200, Marek Marcola wrote:
> > >  $ openssl x509 -in cert.pem -text -noout
> > >  .
> > >  .
> > >          X509v3 extensions:
> > >             X509v3 Basic Constraints:
> > >                 CA:FALSE
> > >             X509v3 Key Usage:
> > >                 Digital Signature, Non Repudiation, Key Encipherment
> > >  .
> >
> > Perhaps a mini-ca will help. See "ca.sh", "cert.sh" and "openssl.cnf"
> > used as follows:
> [snip]
> 
> Thanks Victor,
> 
> Can you see anything amiss with my attached openssl.cnf?
Your openssl.cnf looks good, but to get certificate with keyUsage
you must issue new certificate and then check for extensions.
This file is only consulted when issuing certificate.

When issuing certificate you will see certificate details
with (or without :-) keyUsage information:

$ openssl ca -config openssl.cnf -in req.pem
Using configuration from openssl.cnf
Enter pass phrase for /some/path/cakey.pem:
Check that the request matches the signature
Signature ok
Certificate Details:
....
        X509v3 extensions:
            X509v3 Basic Constraints:
                CA:FALSE
            X509v3 Key Usage:
                Digital Signature, Non Repudiation, Key Encipherment,
Key Agreement
....
Certificate is to be certified until May 26 22:37:53 2008 GMT (365 days)
Sign the certificate? [y/n]:

Best regards,
-- 
Marek Marcola <[EMAIL PROTECTED]>

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to