Hello,

some time now I'm having problems with X509_verify() from openssl-1.0.0-27.el6_4.2.i686 shipped with latest RHEL 6. The problem is that a self-signed certificate that I generate and verify on the server side, fails to verify on the client side after the TLS handshake.

Since this works fine with latest OpenSSL I assumed it's a bug in OpenSSL and did a git-bisect. The commit that fixes it seems to be:


commit 39239280f3576f3418dadbf751bc7a2bb3252d4e
Author: Dr. Stephen Henson <st...@openssl.org>
Date:   Sun Oct 3 18:58:09 2010 +0000

Add call to ENGINE_register_all_complete() to ENGINE_load_builtin_engines(), this means that some implementations will be used automatically, e.g. aesni, we do this for cryptodev anyway.

Setup cpuid in ENGINE_load_builtin_engines() too as some ENGINEs use it.


This commit contains the following description in CHANGES:

+  *) Don't reencode certificate when calculating signature: cache and use
+     the original encoding instead. This makes signature verification of
+     some broken encodings work correctly.


Can you please explain me what a "broken" encoding is, and how I might be using it? How can I self-sign a certificate that can be verified in old versions as well?


Thank you in advance,
Dimitris
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to