Hello!

When you connect to a webserver for which you do not have a trusted CA 
certificate, normally the browser allows you to permanently accept the 
certificate and continue. 

How can this be done using OpenSSL? If I add this non-self-signed certificate 
to the list of trusted certificates (e.g. via CAfile), it is ignored and 
verification fails.
I have never had any success if the certificate chain was incomplete.

Example:
I have the following certificates:

   root-ca.cert -> ca.cert -> server.cert

The server uses server.cert as certificate.

If CAfile contains root-ca.cert, everything works fine. 

However, if CAfile only contains server.cert verification fails. But this is 
exactly what most browsers allow: Just accept any certificate as long as the 
user has allowed to accept it.

So how can this be done using OpenSSL? Is there any option I can set? Or is 
there only the brute force way of using the verify callback, reading all the 
certificates from CAfile and comparing them manually with the server 
certificate?

Regards,

   Matthias Meixner

 ______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to