On Mon, Jun 02, 2003, Wu Junwei wrote:

> Hi,Steve,
> 
> Thanks for your kindly answer.
> 
>   But, I am still not very clear.
> 
> In my understinding
> 
>  I think responder may be not the signer of the reponse because the CA of
> the certificate in question can sign the response itself.
> 
> The public key got from the responder's certificate is  X509_PUBKEY *key in
> X509_CINF struct in X509 struct.
> I think this public key should be the public key of the responder itself.
> 
> So I still can not understand why the signer's public key must be the public
> key of the responder.
> Especially , when the CA signs the response itself.
> 
> 
> What step do you think in my understanding is wrong or not totally correct?
> 

Well let me explain it a different way.

The response is always signed by a private key. That corresponding public key
(the responders ket) is contained in a certificate (the responders
certificate). 

The ResponderId is used to identify the responder's certificate.

Now the responder's certificate doesn't have to be unique. In the example of
the CA signing the response the responders certificate will be the CAs
certificate.

It should be noted though that the model of a CA signing the response may not
be used too much in practice because it means the responder needs access to
the CAs private key. 

Whereas the delegated model just needs a public key contained in a certificate
signed by that CA.

Steve.
--
Dr Stephen N. Henson.
Core developer of the   OpenSSL project: http://www.openssl.org/
Freelance consultant see: http://www.drh-consultancy.demon.co.uk/
Email: [EMAIL PROTECTED], PGP key: via homepage.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to