<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OPENSSL to verify CSF &amp; IMG certificates in i.MX Processors</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/OPENSSL-to-verify-CSF-IMG-certificates/m-p/665523#M102352</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Yuri.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is exactly what I did. I combined the certificates of CA and SRK1 into one (CA-SRK1-chain.pem) and then I used that to verify. It worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Greetsm&lt;/P&gt;&lt;P&gt;Satya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 Jul 2017 10:52:57 GMT</pubDate>
    <dc:creator>satyadamarla</dc:creator>
    <dc:date>2017-07-12T10:52:57Z</dc:date>
    <item>
      <title>OPENSSL to verify CSF &amp; IMG certificates</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/OPENSSL-to-verify-CSF-IMG-certificates/m-p/665520#M102349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are three certificates: SRK, CSF &amp;amp; IMG.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SRK is kind of intermediary certificate, whereas CSF and IMG are subordinate or user certificate. The SRK certificate is signed by CA whereas the CSF/IMG are signed by SRK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to verify the SRK and it works well:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM style="color: #008000;"&gt;openssl verify -CAfile CA1_sha256_3072_65537_v3_ca_crt.pem SRK1_sha256_3072_65537_v3_ca_crt.pem &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM style="color: #008000;"&gt;SRK1_sha256_3072_65537_v3_ca_crt.pem: OK&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whereas when I try to verify the IMG and CSF with SRK or CA, it doesn't work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM style="color: #ff0000;"&gt;openssl verify -CAfile SRK1_sha256_3072_65537_v3_ca_crt.pem CSF1_1_sha256_3072_65537_v3_usr_crt.pem &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM style="color: #ff0000;"&gt;CSF1_1_sha256_3072_65537_v3_usr_crt.pem: CN = SRK1_sha256_3072_65537_v3_ca&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM style="color: #ff0000;"&gt;error 2 at 1 depth lookup:unable to get issuer certificate&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM style="color: #ff0000;"&gt;openssl verify -CAfile SRK1_sha256_3072_65537_v3_ca_crt.pem IMG1_1_sha256_3072_65537_v3_usr_crt.pem &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM style="color: #ff0000;"&gt;IMG1_1_sha256_3072_65537_v3_usr_crt.pem: CN = SRK1_sha256_3072_65537_v3_ca&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM style="color: #ff0000;"&gt;error 2 at 1 depth lookup:unable to get issuer certificate&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone suggest me how to verify CSF &amp;amp; IMG certificates properly?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Greets,&lt;/P&gt;&lt;P&gt;Satya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jul 2017 08:13:32 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/OPENSSL-to-verify-CSF-IMG-certificates/m-p/665520#M102349</guid>
      <dc:creator>satyadamarla</dc:creator>
      <dc:date>2017-07-12T08:13:32Z</dc:date>
    </item>
    <item>
      <title>Re: OPENSSL to verify CSF &amp; IMG certificates</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/OPENSSL-to-verify-CSF-IMG-certificates/m-p/665521#M102350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found the solution myself after a bit of googling. It's important to create the chain. So, I did the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM style="color: #008000;"&gt;cat SRK1_sha256_3072_65537_v3_ca_crt.pem CA1_sha256_3072_65537_v3_ca_crt.pem &amp;gt; SRK1-CA-chain.pem&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM style="color: #008000;"&gt;openssl verify -CAfile SRK1-CA-chain.pem CSF1_1_sha256_3072_65537_v3_usr_crt.pem &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM style="color: #008000;"&gt;CSF1_1_sha256_3072_65537_v3_usr_crt.pem: OK&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM style="color: #008000;"&gt;openssl verify -CAfile SRK1-CA-chain.pem IMG1_1_sha256_3072_65537_v3_usr_crt.pem &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM style="color: #008000;"&gt;IMG1_1_sha256_3072_65537_v3_usr_crt.pem: OK&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;Greets,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;Satya&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jul 2017 08:59:20 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/OPENSSL-to-verify-CSF-IMG-certificates/m-p/665521#M102350</guid>
      <dc:creator>satyadamarla</dc:creator>
      <dc:date>2017-07-12T08:59:20Z</dc:date>
    </item>
    <item>
      <title>Re: OPENSSL to verify CSF &amp; IMG certificates</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/OPENSSL-to-verify-CSF-IMG-certificates/m-p/665522#M102351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Hope the following helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://knowledge.symantec.com/support/mpki-support/index?page=content&amp;amp;id=SO12792&amp;amp;actp=RSS&amp;amp;viewlocale=en_US" title="https://knowledge.symantec.com/support/mpki-support/index?page=content&amp;amp;id=SO12792&amp;amp;actp=RSS&amp;amp;viewlocale=en_US"&gt;https://knowledge.symantec.com/support/mpki-support/index?page=content&amp;amp;id=SO12792&amp;amp;actp=RSS&amp;amp;viewlocale=en_US&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great day,&lt;BR /&gt;Yuri&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;Note: If this post answers your question, please click the Correct Answer button. Thank you!&lt;BR /&gt;-----------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jul 2017 09:08:05 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/OPENSSL-to-verify-CSF-IMG-certificates/m-p/665522#M102351</guid>
      <dc:creator>Yuri</dc:creator>
      <dc:date>2017-07-12T09:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: OPENSSL to verify CSF &amp; IMG certificates</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/OPENSSL-to-verify-CSF-IMG-certificates/m-p/665523#M102352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Yuri.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is exactly what I did. I combined the certificates of CA and SRK1 into one (CA-SRK1-chain.pem) and then I used that to verify. It worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Greetsm&lt;/P&gt;&lt;P&gt;Satya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jul 2017 10:52:57 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/OPENSSL-to-verify-CSF-IMG-certificates/m-p/665523#M102352</guid>
      <dc:creator>satyadamarla</dc:creator>
      <dc:date>2017-07-12T10:52:57Z</dc:date>
    </item>
  </channel>
</rss>

