You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jul 29, 2022. It is now read-only.
I am using a legacy version 1 x509 certificate which doesn't have v3 extensions and SANs. This results in BadDer error from WebPKI. This is an info request for:
Can I use this to verify a version 1 x509 certificate.
How do I hook this with TLS verifier of Rustls.
Thanks
The text was updated successfully, but these errors were encountered:
amrx101
changed the title
Can we verify version 1 x509 cert and integrating with Rustls
QUESTION Can we verify version 1 x509 cert and integrating with RustlsJun 25, 2020
Verifying version 1 certificates is definitely in-scope for this project. That said, how do you plan on verifying the certificate chain? x509-signature can’t build certificate chains on its own, and doesn’t know how to parse DNs either. You will need to do both yourself.
Hi I came here from this.
I am using a legacy version 1 x509 certificate which doesn't have
v3 extensions
andSANs
. This results inBadDer
error fromWebPKI
. This is an info request for:Rustls
.Thanks
The text was updated successfully, but these errors were encountered: