> Ok, SSL_VERIFY_PEER enforces all verification errors to be enforced, > thus SSL_connect() will result in hard failure, as shown below. > You will never reach the SSL_get_verify_result() below. No, you are right, Ive been trying stuff...
> > openssl req -config ${MIX_HOME}/ssl/openssl.cnf -new -x509 -keyout > > $MIX_HOME/ssl/key${MY_ID}.pem -out ${MIX_HOME}/ssl/cert${MY_ID}.pem > > -nodes > > Hmm. This shall result in self-signed certificates??? > Do they pass the "openssl verify" test? do you mean this? delfin ~/dmix/mixes/mix0/ssl>ls -R .: ca cert0.pem key0.pem openssl.cnf ./ca: b319c4fe.pem bf801f59.pem cert0.pem cert1.pem cert2.pem ec419faf.pem delfin ~/dmix/mixes/mix0/ssl>openssl verify -CApath ca cert0.pem cert0.pem: /C=SE/O=SICS/OU=ARC0/CN=delfin.sics.se error 18 at 0 depth lookup:self signed certificate OK delfin ~/dmix/mixes/mix0/ssl> In that case no. What is wrong, if I am supposed be able to use self-signed certs. Best regards: Douglas ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]