SSL_get_certificate
Viktor Dukhovni
openssl-users at dukhovni.org
Mon Sep 9 15:21:24 UTC 2019
> On Sep 8, 2019, at 1:09 PM, Jeremy Harris <jgh at wizmail.org> wrote:
>
>> I have a note from 2017 in my code to the effect that
>> SSL_get_certificate() is broken in that it returns the last
>> cert loaded rather than the one passed out to the client
>> (on the server).
>
> Note that one might have both an EC and an RSA cert loaded.
One of the "CHANGES" entries for 1.0.1d reads:
*) Call OCSP Stapling callback after ciphersuite has been chosen, so
the right response is stapled. Also change SSL_get_certificate()
so it returns the certificate actually sent.
See http://rt.openssl.org/Ticket/Display.html?id=2836.
[Rob Stradling <rob.stradling at comodo.com>]
Consequently 1.0.1d and later had the expected behaviour. However,
in commits this was updated:
dc144417571735c82853421a8845ef603d828a0b (1.0.2-beta1)
e5db9c3b67deb80e274f66e3832a9cfba931670c (also master, at the time 1.1.0-dev)
Minor enhancement to PR#2836 fix. Instead of modifying SSL_get_certificate
change the current certificate (in s->cert->key) to the one used and then
SSL_get_certificate and SSL_get_privatekey will automatically work.
The code for "change the current certificate" was:
diff --git a/ssl/t1_lib.c b/ssl/t1_lib.c
index d0764e8cd3..a438321a41 100644
--- a/ssl/t1_lib.c
+++ b/ssl/t1_lib.c
@@ -2355,6 +2355,18 @@ int ssl_check_clienthello_tlsext_late(SSL *s)
if ((s->tlsext_status_type != -1) && s->ctx && s->ctx->tlsext_status_cb)
{
int r;
+ CERT_PKEY *certpkey;
+ certpkey = ssl_get_server_send_pkey(s);
+ /* If no certificate can't return certificate status */
+ if (certpkey == NULL)
+ {
+ s->tlsext_status_expected = 0;
+ return 1;
+ }
+ /* Set current certificate to one we will use so
+ * SSL_get_certificate et al can pick it up.
+ */
+ s->cert->key = certpkey;
But it only runs if there's a "tlsext_status_cb" callback, which may
not cover all the expected use-cases. I think this merits a new
issue on Github. On servers the function should return the certificate
used, whether that happened via an SNI callback, or simply via choosing
a certificate for the negotiated algorithm...
>> Is this still the case? I can't track down any obvious fix in the
>> OpenSSL git.
>
> Nobody knows?
Perhaps I do now...
--
Viktor.
More information about the openssl-users
mailing list