This is better, but it might disrupt the default verfy procedure, after installing it default verify_callback is not called. Hence I will never know whether the certificate is valid or not ? How will I decide the return value of this callback ?
The previous one suggested by Shmulik Regev is causing the app to crash inside SSL_get_peer_certificate. -Arvind Sachdeva. On 7/28/05, Zerg <[EMAIL PROTECTED]> wrote: > May be this calls will help you... > SSL_CTX_set_cert_verify_callback(ctx, ssl_app_verify_callback, parm); > static int ssl_app_verify_callback(X509_STORE_CTX *ctx, void *arg); > In X509_STORE_CTX there is the peer certificate... > > ______________________________________________________________________ > OpenSSL Project http://www.openssl.org > User Support Mailing List openssl-users@openssl.org > Automated List Manager [EMAIL PROTECTED] > ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]