On Wed, Nov 01, 2000 at 09:28:55PM +0100, Thomas Geller wrote:
> First of all thank you Lutz for your help.
>
> > The result at depth 0 says, that the certificate at level 0 is
> consistently
> > signed from its CA. The CA itself (at level 1) however failed verification
> > for several reasons.
>
On Tue, Oct 31, 2000 at 05:34:24PM +0100, Thomas Geller wrote:
> At this time I'm ignoring all errors in then VerifyCallback and only proof
> then string of the company name in the peer certificate.
> This is not not satisfying for me. On depth 0 OpenSSL passes a value of 1
> for the preverify_ok