Re: Certificate problem - SOLVED

2014-07-08 Thread Jeffrey Walton
On Tue, Jul 8, 2014 at 7:00 PM, Dave Thompson wrote: >> From: owner-openssl-us...@openssl.org On Behalf Of Jeffrey Walton >> Sent: Tuesday, July 08, 2014 16:20 > ... >> Not sure if this is any consolation, but countryName is a >> DirectoryString, and PrintableString is OK per RFC 5280 >> (http://t

Re: Certificate problem

2014-07-08 Thread Dr. Stephen Henson
On Mon, Jul 07, 2014, Dave Thompson wrote: > > The only thing that springs to mind that could be invisible is string types > and > some options of the cert Issuer fields vs the CA Subject. RFC 5280 requires > a > fairly complicated Unicode-aware comparison algorithm which I believe > openssl >

Re: Certificate problem - SOLVED

2014-07-08 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Jeffrey Walton > Sent: Tuesday, July 08, 2014 16:20 > On Tue, Jul 8, 2014 at 3:39 PM, Barbe, Charles > wrote: > > I figured it out and am now wondering if there is a defect in the openssl > verify command. This suggestion from Dave Thompson: >

Re: Certificate problem - SOLVED

2014-07-08 Thread Jeffrey Walton
On Tue, Jul 8, 2014 at 4:48 PM, Barbe, Charles wrote: > Also don't these lines of the spec: > > countryName ATTRIBUTE ::= { > WITH SYNTAX PrintableString (SIZE (2)) > -- IS 3166 codes only > ID

Re: undefined reference to "FIPS_mode_set'

2014-07-08 Thread Thomas Francis, Jr.
You need to compile the FIPS module and then a version of OpenSSL that uses that module. See https://www.openssl.org/docs/fips/UserGuide.pdf for links to appropriate documentation, depending on which version of the FIPS module you need to use (probably the latest one if you don't know you need th

RE: Certificate problem - SOLVED

2014-07-08 Thread Barbe, Charles
Also don't these lines of the spec: countryName ATTRIBUTE ::= { WITH SYNTAX PrintableString (SIZE (2)) -- IS 3166 codes only ID id-at-countryName } indicate that countryName is r

RE: Certificate problem - SOLVED

2014-07-08 Thread Barbe, Charles
Yet openssl verify said OK to both of my certificates against the CA certificate... so is it incorrectly neglecting to compare the types when it tries to build the chain of certificates? Charles A. Barbe Senior Software Engineer Allworx, a Windstream company 245 East Main St | Rochester NY | 146

Re: Certificate problem - SOLVED

2014-07-08 Thread Jeffrey Walton
On Tue, Jul 8, 2014 at 3:39 PM, Barbe, Charles wrote: > I figured it out and am now wondering if there is a defect in the openssl > verify command. This suggestion from Dave Thompson: > I would first try x509 -noout -subject|issuer -nameopt multiline,show_type > and see if that helps. > Pointed m

RE: Certificate problem - SOLVED

2014-07-08 Thread Barbe, Charles
I figured it out and am now wondering if there is a defect in the openssl verify command. This suggestion from Dave Thompson: I would first try x509 -noout -subject|issuer -nameopt multiline,show_type and see if that helps. Pointed me in the right direction. What i found was that Issuer for certif

Re: OS/390 z/OS Help Needed

2014-07-08 Thread Richard Könning
Am 08.07.2014 18:10, schrieb T. Travers: I am new to this forum so please excuse me if I do not do this right. I am working on a z/OS 1.13 system aka OS/390 aka MVS. We have the need to parse X509 certificates. We were using an older version, 0.9.6a, but found that it did not interpret new signi

OS/390 z/OS Help Needed

2014-07-08 Thread T. Travers
I am new to this forum so please excuse me if I do not do this right. I am working on a z/OS 1.13 system aka OS/390 aka MVS. We have the need to parse X509 certificates. We were using an older version, 0.9.6a, but found that it did not interpret new signing algorithms correctly. I pulled down 1

Re: Reg. type of certificate - CA / EE based on X509_check_ca().

2014-07-08 Thread Jeffrey Walton
> The controlling standard is not RFC 3280, or in fact any of the RFCs. It is > X.509, available from http://www.itu.int/. (You can get the latest ratified > edition for no cost.) If its a server certificate issued by a CA intended to be consumed by browsers (or other related services), then the

Re: Reg. type of certificate - CA / EE based on X509_check_ca().

2014-07-08 Thread Kyle Hamilton
This is unfortunately something that you need to figure out for yourself. The controlling standard is not RFC 3280, or in fact any of the RFCs. It is X.509, available from http://www.itu.int/. (You can get the latest ratified edition for no cost.) However: 2 should probably not be considered a

Re: Reg. type of certificate - CA / EE based on X509_check_ca().

2014-07-08 Thread Sanjaya Joshi
Thanks for the reply Tom and Kyle H. Now i have below 2 questions: (1) Based on application's need, can we assume return codes 2, 3 and 4 as non-CA ? (2) If we get return code 4 "basicConstraints absent but keyUsage present and keyCertSign asserted" for a certificate, is this a valid certificate