I'll answer my own question here.  :-)

The code was written to use the OpenSSL 0.9.0b library (yes, I know - it was
very old).  Apparently, the Subject and Authority Key Identifiers were not
getting set properly during the signing process.

Thanks,
Terry

> -----Original Message-----
> From: Richard Koenning [mailto:[EMAIL PROTECTED] 
> Sent: Monday, July 07, 2003 11:09 AM
> To: [EMAIL PROTECTED]
> Subject: Re: Certificate chains and serial numbers
> 
> 
> Henning, Terry wrote:
> > I'm having a problem verifying a certificate with the 
> "X509_verify()" 
> > call.
> >  
> > Using the command-line tool to verify the certificate, I get:
> >  
> > "error 20 at 0 depth lookup:unable to get local issuer certificate"
> >  
> > The command-line I'm using is:
> >  
> > "openssl verify -verbose -CApath rootcert.pem admcert.pem"
>                             ^^^^^^^
> Try -CAfile instead.
> 
> >  
> > where "rootcert.pem" is the CA certificate, and 
> "admcert.pem" is the 
> > signed certificate that I am trying to verify.  The error being 
> > reported is saying it can't find a trusted root, correct?  Which 
> > doesn't seem right to me because I am specifying the root in the 
> > command-line.  (??)
> 
> Ciao,
> Richard
> -- 
> Dr. Richard W. Könning
> Fujitsu Siemens Computers GmbH, EP LP COM 5
> 
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
> 
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to