1

(4 replies, posted in wolfTPM)

yes i tried with the wrapper but the tpm didn't even initialize

2

(4 replies, posted in wolfTPM)

Sorry but can you share a link with this step to active '--enable-winapi', because I was able to install with vcpkg, I didn't have to enable anything in the windows terminal.

3

(4 replies, posted in wolfTPM)

I trying to do some use cases with wolftpm on windows 10 using visual studio in c++ but i only receive bad args i using the commands wolftpm2_GetRandom, I don't know if I forgot some configuration but the command wolftpm_init its working.


[img]img1.png[/img]

4

(1 replies, posted in wolfSSL)

I'm using this method wc_SetextKeyUsageOID() to fill in my certificate restrictions.

When checking the fields using Decodedcert, I couldn't find support to extract the information from the Extended Key Usage from which I used the wc_SetextKeyUsageOID method.

5

(2 replies, posted in wolfSSL)

Yes, i'm using this flags.

6

(2 replies, posted in wolfSSL)

I'm working with creating certificates and using the wc_SetCustomExtension function to assign the values of certificate restrictions (keyUsageExtended, keyUsage) when I need to decode the generated certificate wolfssl can't get the settings that were assigned.

We are using wc_SetCustomExtension because we were able to assign some constraints as critical.

we use this command in a root certificate

int ret;
ret = wc_SetCustomExtension(&newCert, 1 , "2.5.29.37","2.23.145.1.1", 12);

out:
....
X509v3 Extended Key Usage: critical
                2.23.145.1.1
....

We were able to generate the certificate with wc_SetCustomExtension but we couldn't decode it from .der