Topic: wolfSSL_connect error -188, ASN no signer error to confirm failure
I'm chasing a certificate issue.
Using: #define LIBWOLFSSL_VERSION_STRING "3.14.0"
Building the client.exe example for win32
Works with this cmd: client.exe -M smtp -h 67.195.228.95 -p 587 -d
Does not work with this cmd: client.exe -M smtp -h 67.195.228.95 -p 587 -A .\certs\external\verisignPublicCls3.pem -c .\certs\external\mailyahoocom.pem
Using smtp.mail.yahoo.com (67.195.228.95) as my test site.
Both the server certificate and the root appear to be valid (thumbprint) and current (dates).
There is another cert in the server-cert chain from symantec, but that is identical to the verisign CA.
The only issue I can see is the serial# of the verisign CA is different from the serial in the server-cert.
(Does that matter?)
I could use some guidance as to why peer cert is failing.
wolfSSL_connect error -188, ASN no signer error to confirm failure
My root CA (verisignPublicCls3.pem from verisign) is:
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
My cert (mailyahoocom.pem from smtp.mail.yahoo.com) is:
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
From the README file:
wolfSSL takes a different approach to certificate verification than OpenSSL
does. The default policy for the client is to verify the server, this means
that if you don't load CAs to verify the server you'll get a connect error,
no signer error to confirm failure (-188).