You are a very helpful person. Thank you sir.<br><br>
<blockquote>On Thursday, 24. August 2023 9:54, <span class="mp_address_group"><a title="" rel="tooltip" class="mp_address_email" href="/webmail/send?to=gnupg-users@gnupg.org" data-original-title="gnupg-users@gnupg.org">Werner Koch via Gnupg-users</a></span> wrote:<br><br>
<p>On Thu, 24 Aug 2023 06:07, Stuart Longland said:</p><p>> No, you need `openssl` for that.</p><p>Actually you can do that as well with GnuPG.</p><p> gpgsm --gen-key</p><p>creates either a CSR or a self-signed cert. You can build a CA with it.<br>This requires a parameter file. For example create a file<br>wiki.example.org.parm:</p><p>--8<---------------cut here---------------start------------->8---<br>Key-Type: RSA<br>Key-Length: 2048<br>Key-Usage: sign, encrypt<br>Name-DN: CN=wiki,O=example,C=org<br>Name-DNS: wiki.example.org<br>Serial: random<br>Issuer-DN: CN=MY-ROOT-CA,O=example,C=DE<br>Signing-Key: 184977136DA4D5C90C202F22E3812012ABCD7174<br>--8<---------------cut here---------------end--------------->8---</p><p>The signing key is the keygrip of the ROOT-CA.</p><p>Now run</p><p> gpgsm --gen-key --batch -a -o wiki.example.org.pem wiki.example.org.parm</p><p>(usually you won't use a passphrase) and then run</p><p> gpgsm --import wiki.example.org.pem</p><p>To export the private key you may use</p><p> gpgsm --export-secret-key-raw -a wiki.example.org > wiki.example.org-key.pem</p><p>All from memory - I should write a proper HOWTO. We use this for all<br>internal certificates here in the company with the ROOT-CA's key stored<br>on a smartcard.</p><p>Salam-Shalom,</p><p> Werner</p><p>--<br>The pioneers of a warless world are the youth that<br>refuse military service. - A. Einstein</p>
<p>_______________________________________________<br>Gnupg-users mailing list<br>Gnupg-users@gnupg.org<br>https://lists.gnupg.org/mailman/listinfo/gnupg-users</p></blockquote>