Thanks Jakob for the hint
Let me try out the suggested approach. On Tue, Feb 20, 2018 at 9:23 PM, Jakob Bohm <jb-openssl@xxxxxxxxxx> wrote:
On 20/02/2018 16:38, Devchandra L Meetei wrote:
I have been looking for API like `SSL_CTX_load_verify_mem` which will loadI think it can be done step by step, at least in 1.0.x:
CA[s] from mem buffer.
Looks like OpenSSL does not have it yet, Is there any other way to work around
this ?
First allocate an empty STACK_OF X509 certificates
Then loop over your in-memory CA certificates, passing each to d2i_X509, then adding the resulting X509 object to the stack.
Finally pass that stack as the CA collection to an appropriate SSL_CTX function.
Enjoy
Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
--
Warm Regards
--Dev
OpenPegasus Developer
"I'm one of those people that think Thomas Edison and the light bulb changed the world more than Karl Marx ever did,” Steve Jobs
--Dev
OpenPegasus Developer
"I'm one of those people that think Thomas Edison and the light bulb changed the world more than Karl Marx ever did,” Steve Jobs
-- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users