The name in the certificate will not be automatically verified for you. Your application has to verify that the name specified in the certificate somehow matches who your peer claims to be. So if client verifies a certificate of a server it should make sure that the name in certificate matches the hostname that it used to connect to this server. With client it's usually app specific -- somewhere as part of your protocol your client is probably supplying username or something like that -- this username should be verified to be mentioned in the certificate. If your server doesn't do any authentication of the client you don't need the client certificate at all.
For now, I don't even want to verify anything. and even when implenting the server and using it with a web browser, I have problems : FireFox works wuite fine, but I can't have any page displayed with IE 6.

Do you get any error? Might be result of not having the right ciphers configured.

I've read the man pages for SSL_accept and the only clue I first found was the non-blocking socket. And mine was already non-blocking.
What do you mean then?
I tried to continue despite the WANT_READ error and when I call BIO_gets, it does not read anything : it returns -1 (and SSL_ERROR_SSL if I use SSL_get_error which I'm not sure)

When the socket is non-blocking you have to pretty mcuh always assume that any call can fail with WANT_READ or WANT_WRITE and you will have to just repeat the call again. Usually it is a good idea to do appropriate (read or write) select() before repeating the call.
What if I use a blocking socket?

Blocking socket should only return with a success or final failure (which doesn't have to be retried).

Anyway, as I can now start to connect to my server via a web browser, I'm coming to the client part.
The SSL_connect always return 0.

Use the error printing routins I mentioned in my prev. email to get details on why does it fail.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to