On Tue, Mar 15, 2005 at 10:24:11AM -0500, Victor Duchovni wrote:

> Is there an officially condoned mechanism to avoid caching the peer
> certificate of unverified clients? I want to cache the session keys,
> but if the peer certificate is not verified, there is not much point in
> burning storage saving it in the session cache. Is it perhaps possible to
> drop the cert early in the verification callback (when the verification
> failure is detected)?
> 
> I could void the warranty by:
> 
>     #ifdef DONT_TRY_THIS_AT_HOME
>       X509_free(session->peer);
>       session->peer = 0;
>     #endif
>       buflen = i2d_SSL_SESSION(session, 0);
>       ...
> 
> but I don't believe that I am supposed to bypass the accessor methods
> and mess with the SSL_SESSION structure directly...
> 

Is this the right list for this query? Other traffic I see is rather
more elementary... The openssl-dev list does not appear to be the right
place either...

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to