Re: [openssl-users] How to prove a Certificate is Signed or not

2018-05-03 Thread morthalan
I got two Ideas. I can verify the certificate by comparing the issuer name char *s = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0); char *i = X509_NAME_oneline(X509_get_issuer_name(cert), NULL, 0); int rc = strcmp(s, i); verifying with public key EVP_PKEY *caPubkey = X509_get_pubkey(s

Re: [openssl-users] How to prove a Certificate is Signed or not

2018-05-03 Thread morthalan
, whether it is signed or not. Is there any possibility to check the signature of SignedCertificate.pem. d3x0r wrote > a root cert is the self signed cert. > > > On Thu, May 3, 2018 at 2:50 AM, morthalan < > morthalaanilreddy@ > > > wrote: > >> Bu

Re: [openssl-users] How to prove a Certificate is Signed or not

2018-05-03 Thread morthalan
But In my case, I do not have any root certificate. I have only one signed certificate (SignedCertificate.pem) and one certificate signing request (certReq.pem) . So when I use it as below openssl verify -CAfile SignedCertificate.pem SignedCertificate.pem I am getting error "error 20 at 0 depth

Re: [openssl-users] How to prove a Certificate is Signed or not

2018-05-03 Thread morthalan
No, technically not. I am just searching for a simple method just to check a certificate is signed by CA or not. Because. Something like signing check, I am not quite sure, I do not have proper knowledge on Openssl. d3x0r wrote > https://github.com/d3x0r/sack.vfs/blob/master/src/tls_interface.cc