I have been doing that all along. That's what is so exasperating - following 
insructions doesn't seem to help. (arghh! head banging). That's the 2nd 
function argument. 3rd argument is NULL (not using CAdir).

The file passed to SSL_CTX_use_certificate_chain_file() is client.pem. 

BTW - I tried testing with s_client and got the following error (self signed 
certificate):

openssl s_client -cert c:/ca/chapter5/client.pem \
 -CAfile c:/ca/chapter5/root.pem

[C:/CA/chapter5] s_client
Loading 'screen' into random state - done
Enter PEM pass phrase:
CONNECTED(00000770)
depth=0 /CN=john/ST=WA/C=US/[EMAIL PROTECTED]/O=iWave Testing
verify error:num=18:self signed certificate
verify return:1
depth=0 /CN=john/ST=WA/C=US/[EMAIL PROTECTED]/O=iWave Testing
verify error:num=7:certificate signature failure
verify return:1
depth=0 /CN=john/ST=WA/C=US/[EMAIL PROTECTED]/O=iWave Testing
verify return:1
---
Certificate chain
 0 s:/CN=john/ST=WA/C=US/[EMAIL PROTECTED]/O=iWave Testing
   i:/CN=john/ST=WA/C=US/[EMAIL PROTECTED]/O=iWave Testing
---
Server certificate
-----BEGIN CERTIFICATE-----
MIICPzCCAagCCQCce7fgZxZaajANBgkqhkiG9w0BAQUFADBkMQ0wCwYDVQQDEwRq
b2huMQswCQYDVQQIEwJXQTELMAkGA1UEBhMCVVMxITAfBgkqhkiG9w0BCQEWEm5v
Ym9keUBub3doZXJlLmNvbTEWMBQGA1UEChMNaVdhdmUgVGVzdGluZzAeFw0wNTA0
MjYxNjU3MTBaFw0wNTA1MjYxNjU3MTBaMGQxDTALBgNVBAMTBGpvaG4xCzAJBgNV
BAgTAldBMQswCQYDVQQGEwJVUzEhMB8GCSqGSIb3DQEJARYSbm9ib2R5QG5vd2hl
cmUuY29tMRYwFAYDVQQKEw1pV2F2ZSBUZXN0aW5nMIGfMA0GCSqGSIb3DQEBAQUA
A4GNADCBiQKBgQC4vM5GqVTkDbwr3JBYSdpMPf2Wd2gvfpe8bT0MvnWlcMyMeCmb
LLuk1jRVnHdIpCjN2PSYm9F7B/pKizckFLI9a3xrciwtULq3Y8qX0xpZgDCRdFo4
fW1Acfxo7dxjh2W9iodBGq+xeDhUVNloNKgWzWDVO9KTeOb06DqSTPMU0QIDAQAB
MA0GCSqGSIb3DQEBBQUAA4GBAH5I4V9KOpiJKY6lyZWGcYlQDyWRdx8j3SIiAAGM
k6M/qnmsfdfCFpmeCXs7vS1SjEH0Lt3rUhaM7yXP6M0vD9LrBld8hh/oRI+eNltd
4KZ67oy2OUDQT8m/MxmYA0zc5Aecl8Uh6xC/ZW54K6SqG1TAIPVftHgmGrJYXGfY
fEvf
-----END CERTIFICATE-----
subject=/CN=john/ST=WA/C=US/[EMAIL PROTECTED]/O=iWave Testing
issuer=/CN=john/ST=WA/C=US/[EMAIL PROTECTED]/O=iWave Testing
---
No client certificate CA names sent
---
SSL handshake has read 1015 bytes and written 282 bytes
---
New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA
Server public key is 1024 bit
SSL-Session:
    Protocol  : TLSv1
    Cipher    : DHE-RSA-AES256-SHA
    Session-ID: 077A3A67E61455B33E4D6DC12A8207785978FB9AF6C507B8C357FBE3FC067D30

    Session-ID-ctx:
    Master-Key: CC32FE3DFD88BA329BC2EC5BC7D9EB203961A3DD20C1A630C1011CBFFDD33FEF
3A218395CB8456EB79EDE286B93441A7
    Key-Arg   : None
    Start Time: 1114724486
    Timeout   : 300 (sec)
    Verify return code: 7 (certificate signature failure)
---

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Dr. Stephen Henson
Sent: Thursday, April 28, 2005 1:08 PM
To: openssl-users@openssl.org
Subject: Re: FW: openssl verify conflicts with SSL_connect


On Thu, Apr 28, 2005, John Hoel wrote:

> To include it in the trusted store, I think I will need to hash it and the
> 'root.pem' file as well. I haven't been able to find anything describing how
> this is done. Can you refer me to something?
> 

You just keep root.pem as it is and pass it in the CAfile option to
SSL_CTX_load_verify_locations().

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

NO RELIANCE:  This e-mail will be of no force of effect and will not be binding 
unless a hard copy of this e-mail, signed by an authorized official of the 
company, has been sent to the recipient of this message.

CONFIDENTIAL AND/OR PROPRIETARY:  Information contained in this transmission is 
intended for the use of the individual or entity named above and may contain 
legally proprietary or confidential information. If the reader of this message 
is not the intended recipient, you are hereby notified that any dissemination, 
distribution or copy of this communication is strictly prohibited. If you have 
received this communication in error, please permanently delete this message 
and immediately notify us by telephone at 972-377-1110.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to