Generate private key:
openssl ecparam -name prime256v1 -genkey -out irc_nist256.pem
View info about key:
openssl ec -noout -text -conv_form compressed -in irc_nist256.pem
openssl req -new -key irc_nist256.pem -sha256 -days 1096 -nodes -out freenode.csr
View CSR info:
openssl x509 -in freenode.csr -text -noout
openssl req -in freenode.csr -text -noout
openssl req -x509 -in freenode.csr -key irc_nist256.pem -sha256 -days 1096 -nodes -out freenode.pem
View info about PEM file:
openssl x509 -in freenode.pem -text -noout
openssl pkcs12 -export -clcerts -inkey irc_nist256.pem -in freenode.pem -out freenode.p12 -name "Someguy123 IRC"
NOTE: You must set an export password when asked, to be able to actually import the key into Apple Keychain.
openssl x509 -in freenode.pem -outform der | sha512sum -b | cut -d' ' -f1
openssl x509 -in freenode.pem -outform der | sha1sum -b | cut -d' ' -f1
In my case, I added the SHA512 fingerprint, which worked great.
/msg NickServ CERT ADD abcd1234abcd1234def4321
Simply double click on the freenode.p12
file, or right click and press Open In... > Keychain Access
You should now be able to find your certificate under the login
keychain, in the category Certificates
In the Textual App for macOS, you can select the certificate within the server settings for the IRC server of your choice,
under Advanced > Client Certificate
, and then press Select Certificate
- and select the certificate you
loaded into KeyChain.