This is better, but it might disrupt the default verfy procedure,
after installing it default verify_callback is not called. Hence I
will never know whether the certificate is valid or not ? How will I
decide the return value of this callback ?

The previous one suggested by Shmulik Regev is causing the app to
crash inside SSL_get_peer_certificate.

-Arvind Sachdeva.

On 7/28/05, Zerg <[EMAIL PROTECTED]> wrote:
> May be this  calls  will help you...
> SSL_CTX_set_cert_verify_callback(ctx, ssl_app_verify_callback, parm);
> static int ssl_app_verify_callback(X509_STORE_CTX *ctx, void *arg);
> In X509_STORE_CTX   there is the  peer certificate...
> 
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to