I took a look at the file Verisign returned based on my certificate request.
It does have the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----
wrapping. I ran asn1parse on it and ended up with the following result, so
it seems to be a PKCS7 file.
0:d=0 hl=2 l=inf cons: SEQUENCE
2:d=1 hl=2 l= 9 prim: OBJECT :pkcs7-signedData
13:d=1 hl=2 l=inf cons: cont [ 0 ]
15:d=2 hl=2 l=inf cons: SEQUENCE
17:d=3 hl=2 l= 1 prim: INTEGER :01
20:d=3 hl=2 l= 0 cons: SET
22:d=3 hl=2 l= 11 cons: SEQUENCE
24:d=4 hl=2 l= 9 prim: OBJECT :pkcs7-data
35:d=3 hl=2 l=inf cons: cont [ 0 ]
37:d=4 hl=4 l= 598 cons: SEQUENCE
41:d=5 hl=4 l= 451 cons: SEQUENCE
45:d=6 hl=2 l= 16 prim: INTEGER
:4DCB46731D385295368C53C114F7B139
63:d=6 hl=2 l= 13 cons: SEQUENCE
65:d=7 hl=2 l= 9 prim: OBJECT :md5WithRSAEncryption
76:d=7 hl=2 l= 0 prim: NULL
78:d=6 hl=2 l= 95 cons: SEQUENCE
80:d=7 hl=2 l= 11 cons: SET
82:d=8 hl=2 l= 9 cons: SEQUENCE
84:d=9 hl=2 l= 3 prim: OBJECT :countryName
89:d=9 hl=2 l= 2 prim: PRINTABLESTRING :US
93:d=7 hl=2 l= 32 cons: SET
95:d=8 hl=2 l= 30 cons: SEQUENCE
97:d=9 hl=2 l= 3 prim: OBJECT :organizationName
102:d=9 hl=2 l= 23 prim: PRINTABLESTRING :RSA Data Security, Inc.
127:d=7 hl=2 l= 46 cons: SET
129:d=8 hl=2 l= 44 cons: SEQUENCE
131:d=9 hl=2 l= 3 prim: OBJECT :organizationalUnitName
136:d=9 hl=2 l= 37 prim: PRINTABLESTRING :Secure Server Certification
Auth
ority
175:d=6 hl=2 l= 30 cons: SEQUENCE
177:d=7 hl=2 l= 13 prim: UTCTIME :020814000000Z
192:d=7 hl=2 l= 13 prim: UTCTIME :040813235959Z
207:d=6 hl=2 l= 125 cons: SEQUENCE
209:d=7 hl=2 l= 11 cons: SET
211:d=8 hl=2 l= 9 cons: SEQUENCE
213:d=9 hl=2 l= 3 prim: OBJECT :countryName
218:d=9 hl=2 l= 2 prim: PRINTABLESTRING :US
222:d=7 hl=2 l= 14 cons: SET
224:d=8 hl=2 l= 12 cons: SEQUENCE
226:d=9 hl=2 l= 3 prim: OBJECT :stateOrProvinceName
231:d=9 hl=2 l= 5 prim: PRINTABLESTRING :Texas
238:d=7 hl=2 l= 15 cons: SET
240:d=8 hl=2 l= 13 cons: SEQUENCE
242:d=9 hl=2 l= 3 prim: OBJECT :localityName
247:d=9 hl=2 l= 6 prim: T61STRING :Dallas
255:d=7 hl=2 l= 37 cons: SET
257:d=8 hl=2 l= 35 cons: SEQUENCE
259:d=9 hl=2 l= 3 prim: OBJECT :organizationName
264:d=9 hl=2 l= 28 prim: T61STRING :Kintetsu World Express (USA)
294:d=7 hl=2 l= 13 cons: SET
296:d=8 hl=2 l= 11 cons: SEQUENCE
298:d=9 hl=2 l= 3 prim: OBJECT :organizationalUnitName
303:d=9 hl=2 l= 4 prim: T61STRING :KGIT
309:d=7 hl=2 l= 23 cons: SET
311:d=8 hl=2 l= 21 cons: SEQUENCE
313:d=9 hl=2 l= 3 prim: OBJECT :commonName
318:d=9 hl=2 l= 14 prim: T61STRING :xmlint.kwe.com
334:d=6 hl=3 l= 159 cons: SEQUENCE
337:d=7 hl=2 l= 13 cons: SEQUENCE
339:d=8 hl=2 l= 9 prim: OBJECT :rsaEncryption
350:d=8 hl=2 l= 0 prim: NULL
352:d=7 hl=3 l= 141 prim: BIT STRING
496:d=5 hl=2 l= 13 cons: SEQUENCE
498:d=6 hl=2 l= 9 prim: OBJECT :md5WithRSAEncryption
509:d=6 hl=2 l= 0 prim: NULL
511:d=5 hl=2 l= 126 prim: BIT STRING
639:d=4 hl=2 l= 0 prim: EOC
641:d=3 hl=2 l= 0 cons: SET
643:d=3 hl=2 l= 0 prim: EOC
645:d=2 hl=2 l= 0 prim: EOC
647:d=1 hl=2 l= 0 prim: EOC
Upon finding that, I ran this command to change to PEM.
openssl pkcs7 -in file.pem -print_certs -out certs.pem
...and then tried to feed the resulting PEM to the original PKCS12 command I
was trying.
openssl pkcs12 -export -in key.pem -certfile certs.pem -out server.p12 -name
"Prod Forte Certificate"
Still complained about not being a certificate. I looke at the file and
noticed there were now some additional unencrypted lines of text in it. I
removed that and left the begin and end certificate wrappers, and retried.
Still the same result.
Error loading certificates from input
7925:error:0906D06C:PEM routines:PEM_read_bio:no start
line:pem_lib.c:662:Expect
ing: CERTIFICATE
Also, note, Verisign said this cert.cer file, is not what I give our client
for their requests. Obviously, I don't give them the key.pem or the
req.pem, and now not this, so what do I give them. We are doing server to
server comm, so I need to hand them a certificate to include with their
https requests.
Thanks in advance for any help.
David
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Bob Kupperstein
Sent: Wednesday, August 21, 2002 10:37 AM
To: [EMAIL PROTECTED]
Subject: RE: PKCS#12 and Verisign cert
I suggest:
- edit the certificate file and see if "CERTIFICATE" is indeed in the
first line, as your openssl pkcs12 command claims it doesn't see it.
- see if the asn1parse command can decipher the cert.
- try verifying it by specifying different cert formats to find out what
type it really is.
- try adding "------ BEGIN CERTIFICATE -------", "-------- END
CERTIFICATE --------" wrappers if not there (check number of dashes!).
-Bob
-----Original Message-----
From: David Iungerich [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, August 21, 2002 10:55 AM
To: [EMAIL PROTECTED]
Subject: RE: PKCS#12 and Verisign cert
The cert.cer file is the result of taking a request file in PEM format
(req.pem) and giving it's contents to Verisign for signing. According
to
Verisign, they send back in the same format. Question is, what did they
send back, and did I send the right thing. This is getting a bit
annoying
trying to come up with a server cert and client key to hand out. It
should
be so simple.
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Dr. Stephen Henson
Sent: Tuesday, August 20, 2002 5:37 PM
To: [EMAIL PROTECTED]
Subject: Re: PKCS#12 and Verisign cert
On Tue, Aug 20, 2002, David Iungerich wrote:
> I have the following.
>
> key.pem - private key created with openssl.
> req.pem - CSR created with openssl.
> cert.cer - Signed cert returne from Verisign after sending them
req.pem.
>
> I need to find out what openssl commands to use to package this all up
in
a
> PKCS#12 file that my server requires. Anyone know the specific steps.
>
> I've tried the following, but I get the below error.
>
> openssl pkcs12 -export -in key.pem -certfile cert.cer -out
server.p12 -name
> "Prod Forte Certificate"
>
> I've also tried copying the certificate text in the e-mail that came
back
> from Verisign and placing that in a file with a .pem extension. Same
> result.
>
> Error loading certificates from input
> 20906:error:0906D06C:PEM routines:PEM_read_bio:no start
> line:pem_lib.c:662:Expec
> ting: CERTIFICATE
>
What is in the .cer file? It probably isn't a certificate in PEM
format and may need converting.
Steve.
--
Dr. Stephen Henson [EMAIL PROTECTED]
OpenSSL Project http://www.openssl.org/~steve/
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]