Dr Stephen Henson wrote:

> Anyway there are a couple of formats for "chains". The "standard"
> version if PKCS#7 where you can do...
> 
> openssl crl2pkcs7 -nocrl -certfile user.pem -certfile ca.pem -outform
> DER -out p7.der
> 
> You can use -certfile multiple times and each file can contain multiple
> certificates, just make sure the first certificate of the first file is
> the user certificate.

Yeah!  That did it, wonderful!  I'm really indebted...  Even if sometimes
PKCS#7 did cross my mind, I would have never guessed something starting
with 'crl2' would be the thing...

> If you send that as MIME type application/x-user-cert it should work.
> If you want PEM format I think Netscape is expecting CERTIFICATE in the
> bas64 version while OpenSSL uses PKCS#7 in the BEGIN and END lines, so
> you may need to edit that.

I have not tried PEM format, I used DER, but I will keep this in mind
for later (when I will want PEM probably).

> The other format is a Netscape specific format called a "Netcape
> certificate sequence". The program 'nseq' in 'openssl' can handle these.

Oh, so far I was monkeying with asn1parse and the like to extract
certificates from Netscape chains, I did not notice there was an 'nseq'
thing.  Pity does not grok DER, though.

> The command arguments only allow one file at present and only PEM
> format.
> This should do the trick though:
> openssl nseq -toseq -in certs.pem -out nseq.pem
> Then send nseq.pem as before. You can use PEM format this time.

But it will take several certs from the file, as far as I can see from
the code and from the 'certs.pem' filename you chose, right?

Thanks again,

Julio
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to