I thought that at first, but I made similar certs with critical Key
Usage parameters
using openssl and openssl liked them.   

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Goetz Babin-Ebell
Sent: Friday, August 27, 2004 12:18 PM
To: [EMAIL PROTECTED]
Subject: Re: Problem with some self-signed certs

Hello Jim,

Jim Adams wrote:
> I am experiencing a problem with self-signed server certificates 
> generated by z/OS's pskkyman program in my openssl-enabled telnet 
> client.  Usually, a self- signed certificate will generate an error of

> "self-signed certificate" in my certificate verify callback routine.  
> If I add the certificate to openssl's root store, further verifys are 
> OK.  The z/OS certificates, which are self-signed, generate 2 errors:

> "unable to get local issuer certificate" and "unable to verify the 
> first certificate".  I have previously only seen these errors on 
> CA-signed certs.  Can anybody tell me how a self-signed cert can 
> generate these errors instead of the "self-signed certificate" error?
I have attached the certificate in question.  Any help would be
appreciated.

My guess is:

Since the Key usage states that ths certificate may not be used to sign
certificates:
[...]
             X509v3 Key Usage: critical
                 Digital Signature, Non Repudiation, Key Encipherment,
Data Encipherment [...]

OpenSSL will not accept it as a CA certificate...

Bye

Goetz

--
Goetz Babin-Ebell, software designer,
TC TrustCenter AG, Sonninstr. 24-28, 20097 Hamburg, Germany
Office: +49-(0)40 80 80 26 -0,  Fax: +49-(0)40 80 80 26 -126
www.trustcenter.de www.betrusted.com
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to