[xmlsec] Verifying signature with embedded x509 cert

Aleksey Sanin aleksey at aleksey.com
Tue Dec 4 18:38:27 PST 2007


xmlsec loads trusted certs from the default
crypto-specific storage (e.g. root certs folder
for openssl, nss certs db for NSS, etc.)

Aleksey

Jim Nutt wrote:
> Do I need to load the trusted roots manually (does the xmlsec utility?)? 
> If that's the case, that may be why xmlsec will verify it but my code 
> won't, it doesn't load the root certificates. I'll give that a try.
> 
> On Dec 4, 2007 8:19 PM, Aleksey Sanin <aleksey at aleksey.com 
> <mailto:aleksey at aleksey.com>> wrote:
> 
>     Yes, it will get a key from the certificate! You need a trusted
>     certificate (e.g. root CA certificate) to have the certificate
>     in the signature verified.
> 
>     Aleksey
> 
> 
>     Jim Nutt wrote:
>      > Ok, a bit more info. The xmlsec utility will verify the signature
>      > without being passed the pem file separately, so it apparently is
>     able
>      > to suck the key from the signature. I'm trying to create a
>     minimal size
>      > code set that demonstrates the problem, I'll post that when I
>     have it.
>      >
> 
> 
> 
> 
> -- 
> Jim Nutt
> http://jim.nuttz.org



More information about the xmlsec mailing list