On 09/08/2017 10:08 PM, Dr. Stephen Henson wrote:
On Fri, Sep 08, 2017, Robert Moskowitz wrote:

I am using the test responder:

    openssl ocsp -port 2560 -text -rmd sha256\
          -index index.txt \
          -CA certs/ca-chain.cert.pem \
          -rkey private/$ocspurl.key.pem \
          -rsigner certs/$ocspurl.cert.pem \
          -nrequest 1


What is the SHA1 hash report about?  It comes right after the line:
Certificate ID:

     Certificate ID:
       Hash Algorithm: sha1
       Issuer Name Hash: CA1F5832FA387F0127D8E0583F7331D1B903DBF0
       Issuer Key Hash: A3278D00B053BF259193A4833E669C451DAD36E0
       Serial Number: 762900CAB55A4762
It's the hash algorithm used to hash the issuer name and key to identify them.

And how do you get it to use sha256?

I would think that the -rmd sha256 in the responder command would that? What does it do anyway? It is listed in the -help:

-rmd val Digest Algorithm to use in signature of OCSP response

but not in the man page.

Ah, put -sha256 in the CLIENT request. Seems kind of backward. Or at least the server should have some control over the hash used?

thanks

Bob

--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to