1.0.2 to 1.1 migration problem with verify_callback()

Matt Caswell matt at openssl.org
Mon Aug 5 14:40:09 UTC 2019



On 02/08/2019 18:24, Neptune wrote:
> I am in the process of migrating our code from the 1.0.2 library to 1.1 and
> have run across a situation that I am struggling to reconcile:
> 
> The existing code utilizes the verify_callback() function in order to
> perform validation measures against a peer certificate. This callback
> performs validation such as checking the certificate against a CRL and doing
> wildcard matching. The reason we need to define our own callback and
> validation code is because, as I understand it, the built-in OpenSSL
> wildcard matching will only process one wildcard field prefix (*.domain.com)
> whereas our requirements allow for wildcard patterns beyond just a prefix
> (FOO.*.domain.com, FOO.B*R.domain.com, etc.).
> 
> The problem arises when I attempt to access 'ssl->tlsext_hostname' which is
> understood because this structure is now opaque. I believe the accessor
> function for this is '__owur const char *SSL_SESSION_get0_hostname(const
> SSL_SESSION *s);' in ssl.h. However, within the context of the callback
> function I only have two arguments to work with:
> 
> int verify_callback(int ok, X509_STORE_CTX *ctx)
> 
> This does not provide me with a SSL_SESSION object to pass into the
> SSL_SESSION_get0_hostname accessor function, so...

>From within your callback you can do this to get hold of the SSL object:

SSL *s = (SSL *)X509_STORE_CTX_get_ex_data(ctx,
SSL_get_ex_data_X509_STORE_CTX_idx());

And then this to get hold of the hostname requested:

const char *hostname = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name);


Hope that helps,

Matt


More information about the openssl-users mailing list