is there any working example of how to use verify_hostname in command line?

2022-03-03 Thread Edward Tsang via openssl-users
Hi, I am having a very hard time to get the command line working. Basically just trying to verify hostname via opoenssl command line: openssl s_client -CApath . -CAfile ./cacert.pem -verify_hostname example.com All I get is "unknown option -verify_hostname usage: s_client args" Have tried comb

Re: is there any working example of how to use verify_hostname in command line?

2022-03-03 Thread Edward Tsang via openssl-users
Dukhovni wrote: > [ External sender. Exercise caution. ] > > > On 3 Mar 2022, at 6:09 pm, Edward Tsang via openssl-users < > openssl-users@openssl.org> wrote: > > > > openssl s_client -CApath . -CAfile ./cacert.pem -verify_hostname > example.com > > > &g

Re: is there any working example of how to use verify_hostname in command line?

2022-03-03 Thread Edward Tsang via openssl-users
-verify_hostname google.com -verify_return_error > unknown option -verify_hostname > usage: s_client args > > On Thu, Mar 3, 2022 at 4:10 PM Viktor Dukhovni > wrote: > >> [ External sender. Exercise caution. ] >> >> > On 3 Mar 2022, at 6:09 pm, Edward Tsang

Openssl s_client verify_ip usage on ip wildcard matching

2022-03-11 Thread Edward Tsang via openssl-users
Hi Does verify_ip supports leftmost wildcard? I know that hostname does for SAN and CN. But ip address seems to only support exact match including the port? Is that observation correct? What does it take for verify_ip to support leftmost wildcard matching just like DNS hostname? Thanks

Question about examples in openssl doc X509_STORE_CTX_verify_cb

2022-03-14 Thread Edward Tsang via openssl-users
link: https://www.openssl.org/docs/man1.1.1/man3/X509_STORE_CTX_verify_cb.html I am trying to figure out how this example works but it does not seem to bypass the (use the second example of X509_V_ERR_CERT_HAS_EXPIRED) However the caller code ll long res = SSL_get_verify_result( sslCtx ); still

Re: openssl-users Digest, Vol 88, Issue 18

2022-03-14 Thread Edward Tsang via openssl-users
t;utf-8" > > link: > https://www.openssl.org/docs/man1.1.1/man3/X509_STORE_CTX_verify_cb.html > > I am trying to figure out how this example works but it does not seem to > bypass the (use the second example of X509_V_ERR_CERT_HAS_EXPIRED) > > However the caller code ll > long res = SSL_get_veri

question about trsut root CA, ocsp responder cert, requester singer cert, and issuer cert

2022-06-02 Thread Edward Tsang via openssl-users
I know that we need * ocsp responder cert for verifying the signature of ocsp response, * CA issuer cert to generate CERTID for ocsp request and * ocsp requestor can choose to sign ocsp request using a signer certificate. But instead of having users set that as 3 different settings, I am thinking