) and the like as mentioned in
X509_STORE_add_cert man page or something else ?
Regards,
Michel
-Message d'origine-
De : openssl-users [mailto:openssl-users-boun...@openssl.org] De la part de
Viktor Dukhovni
Envoyé : lundi 30 mars 2020 23:19
À : openssl-users@openssl.org
Objet : Re: Peer certific
s again,
Jason
From: openssl-users on behalf of Viktor
Dukhovni
Sent: Monday, March 30, 2020 9:19 PM
To: openssl-users@openssl.org
Subject: Re: Peer certificate verification in verify_callback
On Mon, Mar 30, 2020 at 09:02:47PM +, Jason Schultz wrote:
> I won't get
On Mon, Mar 30, 2020 at 09:02:47PM +, Jason Schultz wrote:
> I won't get into the details of my application as it's complex, but it
> can act as a client or a server. The case we are worried about is
> obviously when it's acting as a client. I thought the standard way of
> dealing with these t
a.
Thanks.
From: openssl-users on behalf of Viktor
Dukhovni
Sent: Monday, March 30, 2020 6:17 PM
To: openssl-users@openssl.org
Subject: Re: Peer certificate verification in verify_callback
On Thu, Mar 05, 2020 at 02:04:27PM +, Jason Schultz wrote:
>
On Thu, Mar 05, 2020 at 02:04:27PM +, Jason Schultz wrote:
> I have some questions about my application’s verify_callback() function and
> how I handle some of the OpenSSL errors.
You're going about this the wrong way. Instead of tryign (likely
insecurely) to patch up verification errors in
On 30/03/2020 17:01, Jason Schultz wrote:
> For example, if my client application is presented a self-signed certificate
> in the handshake, verify_callback() is called with an error, for which
> X509_STORE_CTX_get_error() returns 18/X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT.
> In this case, my app
l.org
Subject: Peer certificate verification in verify_callback
I have some questions about my application’s verify_callback() function and how
I handle some of the OpenSSL errors.
For example, if my client application is presented a self-signed certificate in
the handshake, verify_callback
I have some questions about my application’s verify_callback() function and how
I handle some of the OpenSSL errors.
For example, if my client application is presented a self-signed certificate in
the handshake, verify_callback() is called with an error, for which
X509_STORE_CTX_get_error() r
Hi all,
Actually we have one CA certificate is provided by service server (That is
root certificate in .pem format and .crt format). I used that certicate to
verify the peer. I got unknown CA. I saw that certificate was coming from
service server having thawte CA and having issuer and subject i
Del Simmons wrote:
>
> Hey guys,
>
> Sorry if this has been answered already. I'm using LWP to post data to a
> https server. The client cert and key is passed properly and the server
> verify's me fine when I submit my POST, but I always get the following
> warning header from LWP/Protocol/http
Hey guys,
Sorry if this has been answered already. I'm using LWP to post data to a
https server. The client cert and key is passed properly and the server
verify's me fine when I submit my POST, but I always get the following
warning header from LWP/Protocol/https.pm: "Client-SSL-Warning: Peer
Hello -
I'm trying to use the Net::SSL perl module to do a simple
https request to PayPal.com. Everything seems to work
fine, except I get the following message embedded in
the response:
Client-SSL-Warning: Peer certificate not verified
Now, from how it looks, it is trying to tell me that th
12 matches
Mail list logo