On Thu November 12 2009, Midori Green wrote:
> On Thu, Nov 12, 2009 at 7:01 AM, PMHager <h...@prima.de> wrote:
> > Just a suggestion which does not consume much time:
> > The .P12 (or .PFX) formats from OpenSSL and Windows
> > are slightly different. To convert between the two,
> > just import the P12 into the MS CertStore "My" and
> > locate and export the certificate with its private
> > key from that list:
> > %SystemRoot%\system32\rundll32.exe /d
> > "%SystemRoot%\system32\INETCPL.CPL",LaunchSiteCertDialog
> > Might be the MacOS is capable to handle that export.
> 
> Dear PMHager:
> 
> Thank you for your suggestion.  Unfortunately, it did not work.
> See the details below...
> 
> I tried out your suggestion on a WinXP VM running on my mac.
> I was successfully able to import my "midori.p12" PKCS12 file
> into the Windows Certificate utility, with both the RSA private
> key and X509v3 certificate, into the "Personal" section.  Since
> I already had my root certificate preloaded into Windows, when
> I selected [View] for my imported certificate, its certificate status
> verified as OK.
> 
> Then as you suggested, I successfully exported both the certificate
> and RSA private key from that Windows certificate utility, into a
> PFX file named "midori.pfx".
> 
> When I copied that "midori.pfx" file back to my mac, and attempted
> to load it into Apple's "keychain access" utility, I still get the same
> error message: CSSMERR_CL_UNKNOWN_FORMAT!
> 
> I am at a loss as to why I am unable to import my *EXISTING* RSA
> private key into Apple's certificate utility, when I can import it
> safely into Windows certificate utility, OpenSSL, Firefox, etc.  This
> certificate was issued to me for VPN access, so I have to use it
> without any substitutions.
>

View the file with a hexeditor, check the line-endings.
It may not have MAC eol and your MAC may be expecting that it does.

Mike 
> The only thing I can think of that may be unusual is that the issued
> certificate has some proprietary non-critical V3 extensions for VPN.
> But these extensions all have valid DER encoding and are listed
> properly under a company's ITU registered OID tree.  (Note that no
> other crypto application that I come across has any problems with
> these certificates.)
> 
> I am very at the end of my rope, with getting PKCS12/PFX to import
> into my mac.  Any advice is greatly appreciate appreciated.
> 
> >> I have been trying unsuccessfully to import a PKCS12 file created by 
> >> openssl
> >> into the "keychain access" application for MacOSX.  When I do, I always get
> >> the error: CSSMERR_CL_UNKNOWN_FORMAT
> >>
> >> Please note the following:
> >>
> >> * 2048 bit rsa private key, PEM encoded and encrypted with 3DES, and
> >>        viewable with the following command:
> >>
> >>           openssl rsa -inform PEM -in midori.key -text
> >>
> >> * X509v3 certificate, signed by a private CA, PEM encoded, and viewable
> >>        with the following command:
> >>
> >>           openssl x509 -inform PEM -in midori.cert -text
> >>
> >> * PKCS12 file created by the following command:
> >>
> >>           openssl pkcs12 -export -inkey midori.key -in midori.cert \
> >>                   -out midori.p12
> >>
> >>        and viewable (dumps RSA key+cert) with the following command:
> >>
> >>            openssl pkcs12 -in midori.p12 -info
> >
> >> Any suggestions on what I need to do to import my *EXISTING* RSA
> >>  private key and certificate into Apple's MacOSX "keychain access"
> >> application?  Thanks.
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
> 
> 


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to