...
> ...
> > As part of modification of the mscapi (cryptoapi.c) file, I
> > try to cleanup the openssl usage. I don't have Windows 
> > environment to test.
> > 
> > I will be glad if users of this feature help me testing this.
...
> ...
> Sure, I could do it now but what are the test cases we are 
> going to run? This is for the cryptoapicert feature? -Dave
> 

OK, I'm not getting it.  Educate me.  I am using an existing and functional
server, and removed all the ca cert and key options in my config and
replaced them with:

  cryptoapica
  cryptoapicert "SUBJ:plexus"

Nevermind the second one -- I verified it works fine in isolation (i.e.
meaning having ca or <ca> makes it work finding the cert and key via capi).
That was mostly a 'using capi to do something at all' sanity check.

I imported my CA cert.  I used the 'pick a sensible place' option.  I
verified that it is located (according to the MMC snapin) at:

Certificates - Current User
  Trusted Root Certification Authorities
    Certificates

which does seem a sensible place.

Upon connect, I am getting the error:

Sat Oct 11 22:25:16 2008 VERIFY ERROR: depth=1, error=self signed
certificate in certificate chain:
/C=US/ST=TX/L=Cedar_Park/O=ziggurat29/CN=ziggurat29_CA/emailAddress=dev@zigg
urat29.com

Not sure what to say about that -- root CA certs are always self-signed, no?

For fun I also imported the server cert.  It wound up at:

Certificates - Current User
  Other People
    Certificates

Didn't do any good there -- no surprise -- but I moved it over to the
trusted root CA and it did no good there either.

I'll be happy to give configs, logs, certs if it's useful.

-Dave


Reply via email to