Hi,
I suppose you were talking about OSX on Intel/Mac. I compiled nss 3.11.4 from cvs, output is attached. /steffen PS: The other mail I sent today can be safely ignored, picked the wrong one out of the postponed messages queue.. On 071001 at 04:35, Nelson B wrote: > https://bugzilla.mozilla.org/attachment.cgi?id=282788 > It's a plain ASCII text file, containing a PEM-encoded certificate. > Let's say you download it into a file named /tmp/ECARootCA.pem > (I don't know if Mac users use /tmp. If not, then please choose some > other suitable temporary/junk directory.) > > Then run commands similar to these: > > pp -t certificate -a -i /tmp/ECARootCA.pem > /tmp/testoutput.txt > mkdir /tmp/DB > echo test > /tmp/DB/pw > # if the following command has problems, try without the "-z /dev/urandom" > certutil -d /tmp/DB -N -z /dev/urandom -f /tmp/DB/pw > # note: the following uses NSS's atob command > grep -v .--- /tmp/ECARootCA.pem | atob -o /tmp/ECARootCA.der > vfychain -d /tmp/DB -u 11 -v /tmp/ECARootCA.der >> /tmp/testoutput.txt 2>&1 > vfychain -d /tmp/DB -u 10 -v /tmp/ECARootCA.der >> /tmp/testoutput.txt 2>&1 > vfychain -d /tmp/DB -u 1 -v /tmp/ECARootCA.der >> /tmp/testoutput.txt 2>&1 > > and email the /tmp/testoutput.txt to me (after removing all the NO and SPAM > from my email address), or post it to the list.
Certificate: Data: Version: 3 (0x2) Serial Number: 14 (0xe) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=ECA Root CA,OU=ECA,O=U.S. Government,C=US" Validity: Not Before: Mon Jun 14 10:20:09 2004 Not After : Thu Jun 14 10:20:09 2040 Subject: "CN=ECA Root CA,OU=ECA,O=U.S. Government,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:4a:f6:79:72:12:ea:80:0a:22:90:e4:3a:57:10:65: d3:06:76:77:28:ca:00:84:21:4f:a4:b6:a6:37:a1:fe: 52:55:55:d4:ef:f8:ad:ee:42:75:11:4c:d1:e2:28:b6: be:d8:50:b5:bc:30:f5:a0:27:a5:0c:5c:12:65:d9:93: c7:84:ca:21:84:3f:2f:9c:09:03:25:94:16:3e:79:f3: ad:2a:08:db:40:d0:d9:de:50:7d:d7:da:b3:50:9c:01: 97:60:4c:c6:c9:54:d5:7b:09:43:0f:52:2b:5d:25:3d: b4:26:e1:ab:1a:f0:4f:1e:e7:34:d4:92:76:41:5a:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Key ID: f6:b8:04:27:0e:56:16:d9:b9:63:d9:fd:a1:54:65:41: a0:08:48:2f Name: Certificate Subject Key ID Data: f6:b8:04:27:0e:56:16:d9:b9:63:d9:fd:a1:54:65:41: a0:08:48:2f Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.2.16.840.1.101.3.2.1.12.1 Policy Name: OID.2.16.840.1.101.3.2.1.12.2 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1e:1d:04:41:8d:9c:67:6d:3d:68:16:f9:ab:4c:16:d4: 44:74:75:ce:0e:1b:3b:0b:ca:a8:c7:7d:a4:38:4c:46: 8c:99:4c:0b:00:94:6d:6b:f7:38:29:55:8b:8b:06:ce: 0e:cb:e0:26:4f:82:69:69:92:2f:4d:e0:45:6f:dc:89: 56:ff:a8:35:7b:aa:1f:4f:c9:dd:5c:3a:56:a7:65:30: 27:3e:88:36:8b:cd:b2:2f:78:b6:7c:af:43:08:2f:38: ba:8c:44:41:b8:2a:2b:68:f1:f5:b2:23:15:3c:25:02: a2:13:93:d7:c6:02:6e:66:75:3f:38:20:4c:2a:d4:6c Fingerprint (MD5): 96:F1:CB:9C:06:AB:B4:80:DA:42:DA:03:57:01:2D:9E Fingerprint (SHA1): 3A:32:EF:7B:9A:B8:36:F8:37:18:1A:4C:EF:A3:55:C6:46:67:AC:BF Chain is good! Chain is bad, -8172 = Peer's certificate issuer has been marked as not trusted by the user. PROBLEM WITH THE CERT CHAIN: CERT 1. CN=ECA Root CA,OU=ECA,O=U.S. Government,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=ECA Root CA,OU=ECA,O=U.S. Government,C=US Chain is bad, -8102 = Certificate key usage inadequate for attempted operation. PROBLEM WITH THE CERT CHAIN: CERT 0. CN=ECA Root CA,OU=ECA,O=U.S. Government,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. CN=ECA Root CA,OU=ECA,O=U.S. Government,C=US
_______________________________________________ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto