wolfssl-examples/certfields/extendedKeyUsage
Andras Fekete 4c2f96ff64 Clean up wolfSSL path variable name 2024-04-04 13:28:23 -04:00
..
Makefile Clean up wolfSSL path variable name 2024-04-04 13:28:23 -04:00
README.md Clean up wolfSSL path variable name 2024-04-04 13:28:23 -04:00
test.c Free resources when finished 2020-01-24 17:16:15 -07:00

README.md

An app for checking the extendedKeyUsage Extensions in a cert.

Assumptions: wolfSSL Library must be configured with --enable-opensslextra wolfSSL lib installed to /usr/local

NOTE: If wolfSSL is installed to custom directory edit Makefile variable WOLFSSL_INSTALL_DIR accordingly for example if you configured wolfSSL with "--enable-prefix=/home/me/wolf-install-dir" then set WOLFSSL_INSTALL_DIR to "/home/me/wolf-install-dir" before running "make"

Building: make

Cleaning: make clean

Sample output:

extendedKeyUsage % ./run
-----------------------------------------------------------
Looking at cert: ./ocsp-responder-cert.pem
extKeyUsage OID: 1.3.6.1.5.5.7.3.9
-----------------------------------------------------------
Looking at cert: ./server-int-cert.pem
extKeyUsage OID: 1.3.6.1.5.5.7.3.1

If there are any questions please do not hesitate to reach out to wolfSSL support staff via support [at] wolfssl [dot] com or through the zendesk channel at https://wolfssl [dot] zendesk [dot] com anytime.