Hello Experties there, could you pls help me?

On Thu, Sep 4, 2008 at 3:45 PM, Kyle Hamilton <[EMAIL PROTECTED]> wrote:

> Honestly, I'm not sure.  DER says that there is One True Encoding for
> any given certificate, and I think (but am not sure) that part of it
> is that "optional" parameters are not an option if the intended values
> match the defaults.
>
> I would guess that one of these is actually in violation of the rules,
> but I'm not enough of an expert on BER/DER encoding to be able to know
> for certain.
>
> -Kyle H
>
> On Mon, Sep 1, 2008 at 5:34 AM, Madhusudhan reddy
> <[EMAIL PROTECTED]> wrote:
>  > Hi,
> >
> >         Thanks for reply.
> >
> >         Yes, it is verign certificate. Even though version info NULL
> > (X509->cert_info->version == NULL), the certifiate verified as valid, the
> > hash creation is equal to the hash in the certificate. I observed, for
> some
> > X509 V1 certificate the version field is NULL, and for some it is not
> NULL.
> > Here Iam attacheing 2 certificates in PEM format. For the cert
> > "test_root4.pem" the version fiels is NULL and for the cert
> "test_root5.pem"
> > version field is not NULL.
> >
> >        But both the certificates verified valid while debugging.
> >
> >        I couldn't guess why verison info NULL for some certs?
> >
> > Thanks,
> > Madhu
> >
> >
> >
> > On 9/1/08, Erwann ABALEA <[EMAIL PROTECTED]> wrote:
> >>
> >> Hi,
> >>
> >> Hodie Kal. Sep. MMVIII est, Madhusudhan reddy scripsit:
> >> >                Thanks for the reply. What i mean here is while loading
> >> > X509
> >> >    V1 certificate using the API "PEM_read_bio_X509_AUX(), the verisn
> >> > filed
> >> >    itself is null, not the value. Pls check the attached .jpg for the
> >> > screen
> >> >    shot.
> >>
> >> The version field is defined as:
> >> version         [0]  EXPLICIT Version DEFAULT v1
> >>
> >> The Version type is defined as:
> >> Version  ::=  INTEGER  {  v1(0), v2(1), v3(2)  }
> >>
> >> DEFAULT implies OPTIONAL, and if this field is absent, then it has to
> >> be considered a version 1 certificate.
> >>
> >> I saved your certificate (a VeriSign one, it seems) to a file, and
> >> checked its signature:
> >> openssl verify -CAfile rootv1.pem rootv1.pem
> >> which replied "Ok".
> >> Do you have a better example of a "bad" certificate?
> >>
> >> --
> >> Erwann ABALEA <[EMAIL PROTECTED]>
> >> -----
> >> I can't be stupid, I completed third grade!
> >> ______________________________________________________________________
> >> OpenSSL Project                                 http://www.openssl.org
> >> User Support Mailing List                    openssl-users@openssl.org
> >> Automated List Manager                           [EMAIL PROTECTED]
> >
> >
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
>

Reply via email to