I see from the code that it is passing SSL_VERIFY_NONE to 
SSL_CTX_set_verify()

 From the man page:


      SSL_VERIFY_NONE
          Server mode: the server will not send a client
          certificate request to the client, so the client will
          not send a certificate.

          Client mode: if not using an anonymous cipher (by
          default disabled), the server will send a certificate
          which will be checked. The result of the certificate
          verification process can be checked after the TLS/SSL
          handshake using the SSL_get_verify_result(3) function.
          The handshake will be continued regardless of the
          verification result.


This is the answer for the case.  Personally I'm not happy with this 
however it is what gkrellm does and it answers my question.  I would 
like the project team to file a bug upstream (if there isn't one 
already) to provide functionality to actually verify the server's 
SSL/TLS certificate.

--
Darren J Moffat

Reply via email to