"Fisk, Kevin" wrote:
> 
> On the client side, you also need the lines:
> 
>     SSL_CTX_use_PrivateKey_file(ctx, "client.pem", SSL_FILETYPE_PEM);
>     SSL_CTX_use_certificate_file(ctx,  "client.pem", SSL_FILETYPE_PEM);
> 
> And, on the server side, you need a verifier function.
> 
>     int verify_callback(int ok, X509_STORE_CTX *ctx)
>     {
>           // return true to allow the connection or false to reject it.
>     }
> 

You don't need a verify_callback function most of the time unless you
are customizing the verify behaviour.

Setting one which returns true all the time while OK for test purposes
is a security hole in a real system. This is because it will accept any
certficate the client presents and ignore such things as whether the
issuer is trusted.

Steve.
-- 
Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
Personal Email: [EMAIL PROTECTED] 
Senior crypto engineer, Gemplus: http://www.gemplus.com/
Core developer of the   OpenSSL project: http://www.openssl.org/
Business Email: [EMAIL PROTECTED] PGP key: via homepage.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to