On Tue, Nov 03, 2009, Adam Rosenstein wrote:

> I definitely get better results with the latest snapshot.  However I still
> don't get my "0 depth lookup:certificate revoked" but instead get a "0 depth
> lookup:CRL path validation error"
> 
> Looking at the differences between my application logic and verify.c, I see
> that the command line uses an X509 Lookup with a file source for -CAFile,
> where as I simply pass in a trusted chain in my verify call, which I can
> achieve in the verify app using the -trusted command line switch instead.
> 
> /opt/openssl_1_0_0/bin/openssl verify -x509_strict -verbose -crl_check
> -extended_crl -CRLfile /tmp/ind.crl  -untrusted /tmp/CA0iCRL.pem -trusted
> /tmp/CA0.pem /tmp/AdamRosenstein.pem /tmp/AdamRosenstein.pem: O = Red
> Condor, OU = PKI, CN = CA0iCRL [CRL path]error 20 at 0 depth lookup:unable
> to get local issuer certificate O = Red Condor, OU = PKI, CN =
> AdamRosenstein error 54 at 0 depth lookup:CRL path validation error
> 
> Am I misunderstanding the intention of the trusted stack?  Does openssl
> provide an in-memory x509 lookup method (from a stack of X509 *'s) or do I
> have to roll my own?
> 
> Thanks for all of your answers Dr Henson, 
> 

Ah that must be a problem with the trusted stack stuff. I'll check that. You
can get an in-memory store by doing:

store = X509_STORE_new();
/* Do this for each cert */
X509_STORE_add_cert(store, cert);

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to