I'm trying to manually verify self signed certificate but the process is not clear. I created a self signed certificate server.cert using a ca.crt file which I also created.
I provided the server.key + server.crt to my SSL server.
now, how the client suppose to verify the server.cert (assuming the server send it server.cert)?
As I understand, when creating a server.crt, the ca supposed to encrypt the Hash(server.cert) using the ca's private-key and this whole thing (including the signature) is the server certificate. so how would I validate the certificate. I suppose I somehow need to be using the ca.cert in my client side? because the ca.cert also contains the ca.public key, but what do I need to do to the server.crt to be able to say that the signature is correct?