I'm working on an implementation of the client side of OCSP stapling.
To verify the stapled information I'm using the chain leading to the
server certificate, as presented in the (repeated) verify callbacks for
the server cert.

As far as I can see I need to do this because the client is only configured
with knowledge of the rootCA cert, not the signing cert for the server cert
(and OCSP stapling), and the signing chain is included in the server cert
info for the connection but not in the OCSP stapling.

Is this the correct overall approach?


The coding I have is:

  if (x509ctx->error_depth != 0)
    if (!X509_STORE_add_cert(x509ctx->ctx, x509ctx->current_cert))
      ERR_clear_error();   /* error expected for rootCA cert already in store */

Is this a legitimate thing to do?
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to