Re: TLSv1 - Certificate Chain

2005-12-12 Thread chinmayareddy
I just figured out that client and server works fine if I generate the certificates using openssl tools.The difference between the two certification generation is in AuthorityKeyIdentifier extension in child (client/server) cert. I have openssl-cert-generator.bat, my-cert-generator.bat. I am using

Re: TLSv1 - Certificate Chain

2005-12-09 Thread chinmayareddy
* I tried with -Veify 9 option. No change in the output still fails with same error (unable to get local issuer certificate).* However with the change in syntax of openssl verify (as you suggested), the verification is failing server.pem - has only ServerCert does not include ServiceProvideCA--

Re: TLSv1 - Certificate Chain

2005-12-09 Thread chinmayareddy
Thanks Victor,But I am able to veify the certs using following commandclientChain.pem has ServiceProviderCA and ClientCert (in that order)serverChain.pem has ServiceProviderCA and ServerCert (in that order) C:\OpenSSL\bin>openssl verify -CApath \certs clientChain.pem c:\certs\clientChain.pem: OKC:\

TLSv1 - Certificate Chain

2005-12-08 Thread chinmayareddy
Hi, I am using to OpenSSL as TLS client and server. I am using certificate chain of size 3 on both sides. On Server SideRootCA (root.pem)ServiceProviderCA ( spca.pem)ServerCert (server.pem)On Client SideRootCA (root.pem)ServiceProviderCA (spca.pem)ClientCert (client.pem)I have placed the certs an