that's the general direction i was slowly moving towards.
i guess one question that i have is since i have to use my
code to do the verification process anyhow, is there any
advantage to even using the X509_verify_cert() call?

thanks once again.

Lutz Jaenicke wrote:

>
> OpenSSL does not support "trusted" certificates that are not self signed
> root CA certificates. It will always walk down the chain.
> What could be done is to catch the mentioned error condition in the
> callback and declare the certificate to be correct, there.
>
> It would take some extensions to the certificate verification code
> to change the behaviour. I don't know how large the interest is
> in such an extension.
>
> Best regards,
>         Lutz
> --
> Lutz Jaenicke                             [EMAIL PROTECTED]
> http://www.aet.TU-Cottbus.DE/personen/jaenicke/
> BTU Cottbus, Allgemeine Elektrotechnik
> Universitaetsplatz 3-4, D-03044 Cottbus
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to