Hi Richard,

that's like I did it till now. Anyway I don't like that solution for several reasons, which is why I also want to evaluate the idea of defining an own "certificate". I am aware of the fact that TLS requires X.509 according to the standard, but that does not bar me from evaluating it against other "certificates". It might make sense for certain applications although I agree it does not sound good if you first hear about it. I can explain you why I think it might make sense via personal mail, if you are interested in it. It is not that I don't want to discuss it in public, but I guess it is off-topic for the list and I don't want to fill everybody's mailbox with that :)

Regards
Carolin

Richard Salz wrote:
You should use a standard certificate and add your own extensions. Don't try to create your own certificate format -- there's no need. Then you just implement your own verify callback that looks for those extensions and their value.

        /r$

--
Visiting Member, IBM Academy
STSM, DataPower Chief Programmer
WebSphere DataPower SOA Appliances
http://www.ibm.com/software/integration/datapower/

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]

Reply via email to