Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Creating cert key for CA: expand availibility of hash algoritms for signing certs #6

Open
techge opened this issue Jan 8, 2018 · 5 comments

Comments

@techge
Copy link

techge commented Jan 8, 2018

When trying to create a root certificate on OpenPGP Card (signature slot) for a AD CS, only a few hash algorithms for signing certificates issued by the CA can be chosen.
Vincent already suggest to fix it by:

Try to replace MS_STRONG_PROV with MS_ENH_RSA_AES_PROV (you may change PROV_RSA_FULL with PROV_RSA_AES).

screenshot_20171116_191513

I will try to do it, but as I have no working building environment set up yet, it may take some time...

@vletoux
Copy link
Owner

vletoux commented May 17, 2018

see 639d935

@vletoux
Copy link
Owner

vletoux commented May 19, 2018

Using SHA2 with MS CA requires a KSP and won't work with a CSP

As a proof, Ms Base Smart Card CSP supports only legacy algorithms
image

@jans23
Copy link

jans23 commented Jun 15, 2018

I saw commit 2ab1db2. Is this worth retesting already or WIP?

@vletoux
Copy link
Owner

vletoux commented Jun 15, 2018

KSP is read only (no key generation). Not tested at all.
No WIP for the moment.

@vletoux
Copy link
Owner

vletoux commented Jul 22, 2018

Please test the latest release

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants