On Wed, 2017-07-19 at 12:46 +0200, Steffan Karger wrote: > Hi, > > On 18-07-17 17:46, Gregory Sloop wrote: > > > > Does anyone know definitively what key encryptions/decryptions the iOS > > client will properly handle? [And if there's any difference using unfied > > vs non-unified setups.] > The iOS client is not part of the current community development, but > maintained by OpenVPN Technologies. You could try to get in touch with > them. > > That said, I see no reason why it could not support AES-encrypted keys. > The 2.x community code base even uses AES-encrypted test keys (PEM, not > PKCS12), and those work with both OpenSSL and mbed TLS crypto backends > (just tested as for back as PolarSSL 1.2, but earlier versions probably > too).
There's a bunch of certs/keys you could test with in http://git.infradead.org/users/dwmw2/openconnect.git/tree/HEAD:/tests/certs
smime.p7s
Description: S/MIME cryptographic signature
------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________ Openvpn-devel mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/openvpn-devel
