On Wed, Mar 15, 2006, michael Dorrian wrote:

> First of all thank you for your reply.  I read one of your previous replies
> to the following post and this seems to be what i need.
> http://www.mail-archive.com/openssl-users@openssl.org/msg20673.html X509_AUX
> is a "trusted certificate" format "With PEM_read_bio_X509_AUX if the
> certificate is trusted then the extra data will be included."
>    
>   This returns an X509_AUX structure and i think its this auxilliary
>   information that i need to decide whether the certificate is from a
>   trusted authority or not. I don't know how to extract this information
>   though. At the moment i get my X509 structure using
>   SSL_get_peer_certificate(). I need to use this in order to get the server
>   certificate. Then i extract the information held within this certificate
>   using X509_NAME_print_ex() following your previous advice. How would i go
>   about getting this extra information that i need. 
>   

Not that isn't what you need. That is something else entirely. It is analagous
to the browser trust settings which restrict the purposes a CA can be used
for. By definition the CA has to be trusted before those are set.

Back to your original query. A browser doesn't do anything magic to determine
if a certifcate comes from a trusted CA. It contains a list of trusted root CAs
internally and checks against those. OpenSSL does the same thing except it
doesn't come with a pre-loaded set of trusted CAs you have to set them
yourself.

If you don't want to load them from a file you can use the SSL_CTX_get_store()
and X509_STORE_add_cert() as I indicated.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to