On Fri, Dec 01, 2006, Dan Ellis wrote:

> Dr. Stephen Henson wrote:
> 
> >Does the client CA chain include an intermediate certificate which is not
> >
> >being sent: so the server can't build the chain to verify it?
> > 
> >
> I've checked the actual exchange with Wireshark, and it shows that the 
> client is sending the entire chain: client, CA 3, CA 2, root CA. The 
> root CA is the same as the one I'm using in the server.
> 

So how are you adding the root CA to the trusted store. The usual way is to
get the store with SSL_CTX_get_store() and add it with X509_STORE_add_cert().

If there is still a problem I suggest you dump the client certificate to one
file, the rest of the chain to another and do:

openssl verify -CAfile root.pem -untrusted chain.pem -purpose sslclient \
        client.pem

and see what the result is. 

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to