Hi,
> I don't recommend this practice. It reduces the certificate to an
> unauthenticated container of the public key and as such constitutes
> poor security practice; it is both misleading, and places an undue
> burden on users to understand the security implications of such a
> choice.
You are right if this were the only way to authenticate servers. What I
intend is to use the normal way with CAs, but leave the choice to the user if
the CA is not known. I particularly dislike the behaviour of MSIE _not_ to
connect to a secure site with an unknown CA. Even if I _do_ understand the
implications.
> That said, the answer to the technical portions of the question
> are:
>
> The standard serialization format for certificates is DER. It
> comes over the wire that way. The SSLeay package has APIs to deal
> with encoding and decoding from this format. See in particular
> the i2d_X509 and d2i_X509 routines. Also see the ASN1_i2d_fp and
> ASN1_i2d_bio routines for combining these with file and buffered
> BIO. [crypto/asn1]
Thanks! That's what I was looking for!
Bye, Christian.
--
Christian Starkjohann
mail: <cs -AT- obdev.at> or <cs -AT- hal.kph.tuwien.ac.at>
web: http://www.obdev.at/
+-------------------------------------------------------------------------+
| Administrative requests should be sent to [EMAIL PROTECTED] |
| List service provided by Open Software Associates, http://www.osa.com/ |
+-------------------------------------------------------------------------+