>       From: owner-openssl-us...@openssl.org On Behalf Of Yessica De
Ascencao
>       Sent: Wednesday, 16 March, 2011 16:23

>       How I can verify a document that was signed with a certificate of
level three.
>       That is, I have a Root CA, then a certification authority and
finally 
> the certificate whichsigned the document.
>       How I can do to check the list of trusted certificates.

Actually you're verifying a timestamped signature, not just a signature; 
the principles are similar but the details are different.
        
>       This is because I have a Root CA that issued a CERTIFIED for TSA,
and 
> the TSAissued a certificate for a TSS which is implemented with openTSA.
When applied
        
>       . / openssl ts-verify-data-file-in response9.tsr
ACstamping-SHA256.pem cafile

That's bogus and can't possibly have done what you say. You must mean 
  ./openssl ts -verify -data file -in rspfile -CAfile cafile 
(assuming openssl, or a link to it, is in your data directory; 
that's usually not best practice, although the program doesn't mind).
Spacing, presence or absence of hyphens, and capitalization are all
critical.
        
>       throws ... ts_rsp_verify.c:246: unable to get issuer certificate

Concatenate (at least) those three (PEM) certs into one file 
and give that to -CAfile, or put them as separate (PEM) files 
in a directory *with hashlinks* and give that to -CApath.
I think it also works to use a combination, but that's confusing.



______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to