ing back to Crypt::SSLeay and take a 2nd crack at
it.
Please, please, please, let me know if this is a known issue
that I just couldn't find any information on. It would be greatly
appreciated.
Thanks!
- Chris
-Original Message- From:
[EMAIL PROTECTED] [mailto:[E
w if this is a known issue that I just couldn't find any information on. It would be greatly appreciated.
Thanks!
- Chris
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Chris Mckenzie
Sent: June 8, 2005 2:42 PM
To: 'openssl-users@openssl.org
_CRL_CHECK, that CRL verification won't be performed. Which sort of makes the point of setting it moot.
Any ideas? I'm getting close to giving up.
Thanks.
- Chris
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Chris Mckenzie
Sent: June 8,
ce?
Anyways, thanks for reading my ramblings. I'm going to try and upgrade to the latest stable openssl and see if it makes a difference.
- Chris
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Chris Mckenzie
Sent: June 8, 2005 12:55 PM
To: 'op
Is there a CA cert filename extension that should be met if SSL_ca_path is used?
Thanks.
- Chris
-Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Chris Mckenzie
Sent: June 8, 2005 11:02 AM
To: 'openssl-users@openssl.org'
Subject: RE: Quick que
able correctly. I know it's going to be a stupid mistake on my part.
Any help would be greatly appreciated.
Thanks!
- Chris
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Chris Mckenzie
Sent: June 7, 2005 6:50 PM
To: 'openssl-users@openssl.
exists; ignored for clients), and 0x04 (verify client once) to
change the default.
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Chris Mckenzie
Sent: Tuesday, 07 June, 2005 11:13 AM
To: 'openssl-users@openssl.org'
Subject: Quick question about 'client-ssl
rtfn0wUD3V1eN.rtf
Description: RTF file
smime.p7s
Description: S/MIME cryptographic signature
Title: Message
Hi
all.
I've been making out fairly well with my usage of LWP
and IO::Socket::SSL, to the point where I'm trying to include a list of trusted
peer server and CA certs to trust.
The only problem is I can't seem to force OpenSSL to
drop all non-trusted/verified SSL connecti