Re: Certificate Verification

2007-09-20 Thread Dr. Stephen Henson
On Thu, Sep 20, 2007, [EMAIL PROTECTED] wrote: > Hi, > > I am trying to perform certification verification for a self-signed CA > certificate as well as another certificate signed by this CA. The problem is > that the verification always fails. > > Here is what I do: > > /* Convert the DER en

Re: Certificate verification

2000-03-27 Thread darkspell
Douglas Lee wrote: > Still no good. Sounds like you followed the steps correctly, but that your server still can't find the private key needed to use the cert. Did you concatenate newreq.pem onto newcert.pem? Doing so puts both the cert and the key in the same file, which you can pass to both

Re: Certificate verification

2000-03-27 Thread Dr Stephen Henson
See below... Douglas Lee wrote: > > > 2) Generate new CR file using "CA.sh -newreq". This generates the file > certificate request file newreq.pem. > It also generates a new private key in privkey.pem > 3) Sign the CR file using the CA file by "CA.sh -sign". This generates > the certificat

Re: Certificate verification

2000-03-27 Thread Lutz Jaenicke
On Mon, Mar 27, 2000 at 06:36:32PM +1000, Douglas Lee wrote: > 2) Generate new CR file using "CA.sh -newreq". This generates the file > certificate request file newreq.pem. And the private key in newkey.pem. > 3) Sign the CR file using the CA file by "CA.sh -sign". This generates > the certific

Re: Certificate verification

2000-03-27 Thread Douglas Lee
Still no good. Let's recap what I have done to generate the certificates. Maybe I'm doing something wrong there. Im using the CA.sh script under openssl/apps to generate the certificates. 1) Generate new CA files using "CA.sh -newca". This generates CA certificate cacert.pem and CA key cakey.p

Re: Certificate verification

2000-03-24 Thread darkspell
Sounds like your client can't get its hands on the CA cert needed to verify the server's cert. SSL_CTX_use_certificate_file and SSL_CTX_use_RSAPrivateKey_file load the client-side cert and key you need to present to the server IF the server requires authentication of clients (which it doesn'

Re: Certificate verification

2000-01-04 Thread Per Nilsson
i = X509_verify(x, X509_get_pubkey(x)) will only succeed on self-signed (CA) certificates like Verisign. What you need to do is verify the cert using the pubkey of it's issuer: i = X509_verify(x, X509_get_pubkey(issuer_of_x)) but this will leak memory since X509_get_pubkey(x) adds one to the r

RE: Certificate verification

2000-01-04 Thread Salz, Rich
>Verifying is a complex process Now *there's* an understatement. :) The IETF PKIX draft update to the cert/CRL profile takes 20 pages to specify "path validation." See ch6 of http://www.imc.org/draft-ietf-pkix-new-part1 > and I don't recommend you do it manually: Vandyke&Associates has releas

Re: Certificate verification

2000-01-04 Thread Dr Stephen Henson
Yuriy Stul wrote: > > Hello all! > > For each certificate in chain I do next: > > i = X509_verify(x, X509_get_pubkey(x)); > > For many sites (www.chase.com, www.ubs.com, ...) I have that first certificate > in chain has unmatched signature (i == 0). Only last certificate (from RSA ) > has

Re: Certificate verification

2000-01-04 Thread Goetz Babin-Ebell
At 12:43 04.01.00 +0200, you wrote: >Hello all! Hello, >For each certificate in chain I do next: > >i = X509_verify(x, X509_get_pubkey(x)); >For many sites (www.chase.com, www.ubs.com, ...) I have that first certificate >in chain has unmatched signature (i == 0). Only last certificate (from RSA