> Additional candidate signer certificates  need to be included in the
> -verify_other option.
> 
> If the OCSP signing certificate is self signed then it needs to be explicitly
> trusted which is the -VAfile option if you use that it will also be searched
> as a signer.

doesn't putting it in the CApath also mean it's explicitly trusted?

I tracked down this code in crypto/ocsp/ocsp_vfy.c:
static int ocsp_find_signer(X509 **psigner, OCSP_BASICRESP *bs, STACK_OF(X509)
*certs, X509_STORE *st, unsigned long flags)
        {
        X509 *signer;
        OCSP_RESPID *rid = bs->tbsResponseData->responderId;
        if ((signer = ocsp_find_signer_sk(certs, rid)))
                {
                *psigner = signer;
                return 2;
                }
        if(!(flags & OCSP_NOINTERN) &&
            (signer = ocsp_find_signer_sk(bs->certs, rid)))
                {
                *psigner = signer;
                return 1;
                }
        /* Maybe lookup from store if by subject name */

        *psigner = NULL;
        return 0;
        }

It looks like implementing the "Maybe" case would solve my problem. Would it
be incorrect to look in the store also here? I'd be glad to work on a patch.

I understand I can make the command line tool with with -verify_other, but in
my code I have no handy way to do that. My users are going to dump all trusted
certs, regardless of purpose, into the trusted store.
-- 
Chris Bare
ch...@bareflix.com
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to