On Mon, May 14, 2007, [EMAIL PROTECTED] wrote:

> 
> Hello everybody,
> 
> I try to build a SSL server which performs client authentication and CRL
> management.
> 
> To manage this:
> First, with X509_STORE_add_cert, I add the certificate coming from 
> "trustees.pem" file to verify the client certificate
> Then I read the CRL file and get the corresponding X509_CRL object:
> with X509_STORE_add_crl API, I put my X509_CRL object in the store too
> ansd call X509_STORE_set_flags(st, X509_V_FLAG_CRL_CHECK) to say I want to 
> check
> CRL.
> At least with SSL_CTX_set_cert_store, I put my store in my SSL_CTX structure.
> 
> Whenever a client connects, I get its certificate with 
> SSL_get_certificate_peer
> and as far as I understand, ans I believed I only have to call
> SSL_get_verify_result API in order to know that the client authentication is
> correct and that its certifcate does not belong to those described as revoked 
> in
> CRL file.
> 
> Did I use those API properly since I do not get a correct result ( the client
> certificate has a serial number which is considered as revoked in CRL file  
> but
> the SSL_get_verify_result always returns X509_V_OK ! ) ?
> 
> Thank you in advance for your help !
> 

If have a verify callback that is set to ignore all errors it will show
X509_V_OK.

I'd suggest you try using the s_client application and/or the verify
appllication on the chain.

Failing that post the chain and CRL and the command line you used.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to