I got two Ideas. I can verify the certificate by comparing the issuer name
char *s = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0);
char *i = X509_NAME_oneline(X509_get_issuer_name(cert), NULL, 0);
int rc = strcmp(s, i);
verifying with public key
EVP_PKEY *caPubkey = X509_get_pubkey(s
, whether it is signed or not.
Is there any possibility to check the signature of SignedCertificate.pem.
d3x0r wrote
> a root cert is the self signed cert.
>
>
> On Thu, May 3, 2018 at 2:50 AM, morthalan <
> morthalaanilreddy@
> >
> wrote:
>
>> Bu
But In my case, I do not have any root certificate. I have only one signed
certificate (SignedCertificate.pem) and one certificate signing request
(certReq.pem) . So when I use it as below
openssl verify -CAfile SignedCertificate.pem SignedCertificate.pem
I am getting error "error 20 at 0 depth
No, technically not. I am just searching for a simple method just to check a
certificate is signed by CA or not.
Because. Something like signing check, I am not quite sure, I do not have
proper knowledge on Openssl.
d3x0r wrote
> https://github.com/d3x0r/sack.vfs/blob/master/src/tls_interface.cc