Hi Sierra!
I’ve started working with a HL7800 and need to load the root CA from api.sandbox.ewaypayments.com.
So I headed over to ssltools.com and downloaded the ascii PEM file for api.sandbox.ewaypayments.com, shown in the output below. The AT command interaction is achieved with a little python script.
The key command I’m getting stuck on is AT+KCERTSTORE=0,1316,0
Now the 1316 represents the length of the certificate and I suspect this is what I’m getting wrong. I’m not sure whether to include carriage returns or the begin/end certificate text in the length either. I’ve tried all sorts of combinations with no success. I’m not sure if I should also include an end of file +++ either? and if so do I include the length of that?
Anyway, if anyone is able to get success loading this root ca I will be extremely grateful!!!
Thanks in advance, output of my script is below showing the error.
Cheers
ATI
HL7800
OK
------------> COM PORT OK
AT+CPIN?
+CPIN: READY
OK
------------> SIM OK
AT+CGATT?
+CGATT: 1
OK
------------> GPRS OK
AT+KCGPADDR=?
+KCGPADDR: (1-2)
OK
------------> NETWORK OK
AT+CCLK?
+CCLK: "19/11/30,11:00:26+44"
OK
------------> TIME OK
AT+CMEE=1
OK
AT+CMEE?
+CMEE: 1
OK
AT&K3
OK
AT+CGATT=0
AT+KCNXCFG=1,"GPRS","telstra.wap"
OK
OK
+KCNX_IND: 1,0,0
AT+KCNXUP=1
OK
+KCNX_IND: 1,4,1
AT+KCNXCFG?
+KCNXCFG: 1,"GPRS","telstra.wap","","","IPV4","0.0.0.0","0.0.0.0","0.0.0.0",2
OK
AT+KSSLCFG=0,0
OK
AT+KCERTSTORE=0,1314,0
CONNECT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
ERROR
AT+KCERTSTORE?
CONNECT
root_cert,0,0
local_cert,0,0
local_cert,1,0
local_cert,2,0
OK