Re: [openssl-users] (Probably) Silly Application Programming Question

2016-01-13 Thread Karl Denninger
: > > https://www.openssl.org/docs/manmaster/crypto/X509_VERIFY_PARAM_set_flags.html > > > > Hope this helps, > > > > Regards, > > > > Michel. > > > > *De :*openssl-users [mailto:openssl-users-boun...@openssl.org] *De la > part de* Karl Den

Re: [openssl-users] (Probably) Silly Application Programming Question

2016-01-13 Thread Michel
/X509_VERIFY_PARAM_set_flags.html Hope this helps, Regards, Michel. De : openssl-users [mailto:openssl-users-boun...@openssl.org] De la part de Karl Denninger Envoyé : lundi 11 janvier 2016 04:08 À : openssl-users@openssl.org Objet : Re: [openssl-users] (Probably) Silly Application Programming

Re: [openssl-users] (Probably) Silly Application Programming Question

2016-01-10 Thread Karl Denninger
On 1/10/2016 21:43, Viktor Dukhovni wrote: > On Sun, Jan 10, 2016 at 08:20:41PM -0600, Karl Denninger wrote: > >> I found the problem... for an unexplained reason either the certificate >> or key were corrupt; I have added checking to make sure they're >> coherent, as apparently OpenSSL is perfectl

Re: [openssl-users] (Probably) Silly Application Programming Question

2016-01-10 Thread Karl Denninger
I got that book that's what I've been working with. It looks like there have been some internal changes in OpenSSL and this is no longer "appropriate" to use as null dereferences may occur (well, ok, maybe a bit more than "may") :-) Got some ideas here, thanks... I think I'm pointed in the r

Re: [openssl-users] (Probably) Silly Application Programming Question

2016-01-10 Thread Viktor Dukhovni
On Sun, Jan 10, 2016 at 08:20:41PM -0600, Karl Denninger wrote: > I found the problem... for an unexplained reason either the certificate > or key were corrupt; I have added checking to make sure they're > coherent, as apparently OpenSSL is perfectly happy to load a bogus cert > (or key) without t

Re: [openssl-users] (Probably) Silly Application Programming Question

2016-01-10 Thread Judson Wilson
I think what you want might be found in the book "Network Security with OpenSSL" from the year 2002, and the same code snippit can be found here: http://www.cs.odu.edu/~cs772/ssl/c-examples/NSopenssl/common.c look for "post_connection_check". This is just something I remember from reading. I hav

Re: [openssl-users] (Probably) Silly Application Programming Question

2016-01-10 Thread Karl Denninger
Yeah, now I just have to figure out how to parse the X509 Extension data from the certificate to pull out the SubjectAltName information :-) There wouldn't be a snippet of code laying around somewhere that does that given a X509 cert as input would there? It looks a bit arcane On 1/10/20

Re: [openssl-users] (Probably) Silly Application Programming Question

2016-01-10 Thread Judson Wilson
It's always good to start with the s_client and s_server programs for incrementally verifying compatibility in your new programs. Those would have failed on your certificates, alerting you it's not a program problem. On Sun, Jan 10, 2016 at 6:20 PM, Karl Denninger wrote: > I found the problem..

Re: [openssl-users] (Probably) Silly Application Programming Question

2016-01-10 Thread Karl Denninger
I found the problem... for an unexplained reason either the certificate or key were corrupt; I have added checking to make sure they're coherent, as apparently OpenSSL is perfectly happy to load a bogus cert (or key) without throwing an error, but won't present them. On 1/10/2016 17:07, Judson Wil

Re: [openssl-users] (Probably) Silly Application Programming Question

2016-01-10 Thread Judson Wilson
On the client side, double check that you are creating the SSL object from the context AFTER you set the client cert for the context, and not the other way around. On Sun, Jan 10, 2016 at 2:18 PM, Karl Denninger wrote: > I'm sure this is a function of my lack of understanding of the > documentat

[openssl-users] (Probably) Silly Application Programming Question

2016-01-10 Thread Karl Denninger
I'm sure this is a function of my lack of understanding of the documentation, but here it is... I have an application that implements SSL-encrypted transport between two or more devices. For those that are clients without certificates (e.g. someone connecting with a web browser) it is working fin