I am trying to understand the purpose of the newly introduced SSL functions. Perhaps I don't fully get the verification process yet...
As far as i know, an SSL client verifies the authenticity of an SSL server by using a Public Key (aka Certificate) signed by a CA. This public key is freely distributed so all peers can decrypt the server's certificate and check its authenticity (i.e it was indeed signed by a recognised Certification Authority, and thus all data therein contained can be trusted, particularly the server's identity).
On the other side, an SSL connection can be set to request client's authenticity verification, though this is not usual (think of a bank transfer or an online payment: only the customer, who is transferring money, needs to check the identity of the other peer).
Going back to the subject, can anybody explain the difference between:
espconn_secure_ca_enable: Enable SSL CA (certificate authenticate). Can be set to SERVER/CLIENT or BOTH (?).
espconn_secure_cert_req_enable: Enable certification verification function when ESP8266 runs as SSL client. Uses esp_cert_private_key.bin file (this I don't get).
Especially: why does the latter require a Private Certificate for validation? Is it being used for signing the client's certificate?
I understand that so far we had used only a single key-pair, and that perhaps now you are deploying two different set's of key-pairs.
Please explain.
Thanks for your support!
King regards,
HoracioStatistics: Posted by hdrut — Sat Sep 19, 2015 8:43 pm
]]>