On Wed, 2017-07-19 at 12:46 +0200, Steffan Karger wrote:
> Hi,
> 
> On 18-07-17 17:46, Gregory Sloop wrote:
> > 
> > Does anyone know definitively what key encryptions/decryptions the iOS
> > client will properly handle? [And if there's any difference using unfied
> > vs non-unified setups.]
> The iOS client is not part of the current community development, but
> maintained by OpenVPN Technologies.  You could try to get in touch with
> them.
> 
> That said, I see no reason why it could not support AES-encrypted keys.
> The 2.x community code base even uses AES-encrypted test keys (PEM, not
> PKCS12), and those work with both OpenSSL and mbed TLS crypto backends
> (just tested as for back as PolarSSL 1.2, but earlier versions probably
> too).

There's a bunch of certs/keys you could test with in
http://git.infradead.org/users/dwmw2/openconnect.git/tree/HEAD:/tests/certs

Attachment: smime.p7s
Description: S/MIME cryptographic signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to