...
> ...
> > As part of modification of the mscapi (cryptoapi.c) file, I
> > try to cleanup the openssl usage. I don't have Windows
> > environment to test.
> >
> > I will be glad if users of this feature help me testing this.
...
> ...
> Sure, I could do it now but what are the test cases we are
> going to run? This is for the cryptoapicert feature? -Dave
>
OK, I'm not getting it. Educate me. I am using an existing and functional
server, and removed all the ca cert and key options in my config and
replaced them with:
cryptoapica
cryptoapicert "SUBJ:plexus"
Nevermind the second one -- I verified it works fine in isolation (i.e.
meaning having ca or <ca> makes it work finding the cert and key via capi).
That was mostly a 'using capi to do something at all' sanity check.
I imported my CA cert. I used the 'pick a sensible place' option. I
verified that it is located (according to the MMC snapin) at:
Certificates - Current User
Trusted Root Certification Authorities
Certificates
which does seem a sensible place.
Upon connect, I am getting the error:
Sat Oct 11 22:25:16 2008 VERIFY ERROR: depth=1, error=self signed
certificate in certificate chain:
/C=US/ST=TX/L=Cedar_Park/O=ziggurat29/CN=ziggurat29_CA/emailAddress=dev@zigg
urat29.com
Not sure what to say about that -- root CA certs are always self-signed, no?
For fun I also imported the server cert. It wound up at:
Certificates - Current User
Other People
Certificates
Didn't do any good there -- no surprise -- but I moved it over to the
trusted root CA and it did no good there either.
I'll be happy to give configs, logs, certs if it's useful.
-Dave