On Tue, Jul 16, 2002 at 11:28:32AM -0400, Kervin Pierre wrote:
> this is actually what I thought as well.
> 
> Is there a suitable replacement?
> 
> Here is how the function is used...
> 
> from ldap/libraries/libldap/tls.c
> 
> //=============================================
> 
> static X509 *
> tls_get_cert( SSL *s )
> {
>         /* If peer cert was bad, treat as if no cert was given */
>         if (SSL_get_verify_result(s)) {
>                 /* If we can send an alert, do so */
>                 if (SSL_version(s) != SSL2_VERSION){
> 
> ssl3_send_alert(s,SSL3_AL_WARNING,SSL3_AD_BAD_CERTIFICATE);
>                 }
>                 return NULL;
>         }
>         return SSL_get_peer_certificate(s);
> }

Obviously the software is implemented to have the handshake succeed
regardless of the certificate verification result and then only
check out the certificate verification result later on.
That's what the original function of the verification routines (and callback
function). They check the certificate and have the handshake fail if
they are not satisfied with the result. By using the callback function
the application can adjust the default behaviour.

Best regards,
        Lutz
-- 
Lutz Jaenicke                             [EMAIL PROTECTED]
http://www.aet.TU-Cottbus.DE/personen/jaenicke/
BTU Cottbus, Allgemeine Elektrotechnik
Universitaetsplatz 3-4, D-03044 Cottbus
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to