Hi everybody,

  I have problem with verifing certificate.                               
  
  I'm sending temporary_certificate signed by user_certificate (that one I'm
sending too) into my server. The user_certificate is signed by CA (my server 
has CA's certificate).
I need to use the temporary_certificate to encrypt the reply, but first it has 
to be verified. To do that I must save user_certificate to a file whose name
is hash from the user_certificate. 

sprintf(hash_user_cert_write,".ssl/%08lx.0",
        X509_subject_name_hash(user_certificate)))

  But that's not too clear since I have to delete the file
afterwards. Is there any possible way to verify temporary certificate
without saving user_certificate to a file? I'm keeping both the
certificates in X509 structures.

Regards

Petr Holub

--
e-mail: [EMAIL PROTECTED]
Web_page: http://www.fi.muni.cz/~holub
Public_PGP_key: http://thetis.fi.muni.cz/noauth/pgp/show_pgp.cgi?user=holub
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to