You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently this is not possible through the command line because the only flow for creating a signed certificate is to first create a PKCS10 request (botan gen_pkcs10) then sign it (botan sign_cert), PKCS10 uses a signature as proof of possession, and ML-KEM cannot sign.
You can create such a certificate using the (quite low level/escape hatch) function X509_CA::make_cert since this doesn't require involving PKCS10.
Can you share how you created these certs using OpenSSL? I though OpenSSL similarly only had a PKCS10->cert flow, at least in the cli.
As you see, OpenSSL allows to "force" the pubkey into a cert, bypassing the need for a CSR - as CSR (obviously) is not possible for ML-KEM type of keys that can't perform signing operation.
Background
Using OpenSSL-3.4.0 with OQS provider (from Open Quantum Safe), I
Botan-3.7.0 parsed the above certs and validated the ML-KEM cert.
Goal
I want to replicate the above (1)-(3) with Botan, aka generate keypairs and create corresponding certificates.
Current progress
Problem
Cannot figure out how to create a certificate signed by the above CA for the ML-KEM public key. Would appreciate help.
The text was updated successfully, but these errors were encountered: