Minor enhancement to PR#2836 fix. Instead of modifying SSL_get_certificate
change the current certificate (in s->cert->key) to the one used and then SSL_get_certificate and SSL_get_privatekey will automatically work.
This commit is contained in:
parent
da8512aaff
commit
dc14441757
4
CHANGES
4
CHANGES
@ -5,8 +5,8 @@
|
||||
Changes between 1.0.1 and 1.0.2 [xx XXX xxxx]
|
||||
|
||||
*) Call OCSP Stapling callback after ciphersuite has been chosen, so
|
||||
the right response is stapled. Also change SSL_get_certificate()
|
||||
so it returns the certificate actually sent.
|
||||
the right response is stapled. Also change current certificate to
|
||||
the certificate actually sent.
|
||||
See http://rt.openssl.org/Ticket/Display.html?id=2836.
|
||||
[Rob Stradling <rob.stradling@comodo.com>]
|
||||
|
||||
|
@ -2840,14 +2840,6 @@ void ssl_clear_cipher_ctx(SSL *s)
|
||||
/* Fix this function so that it takes an optional type parameter */
|
||||
X509 *SSL_get_certificate(const SSL *s)
|
||||
{
|
||||
if (s->server)
|
||||
{
|
||||
CERT_PKEY *certpkey;
|
||||
certpkey = ssl_get_server_send_pkey(s);
|
||||
if (certpkey && certpkey->x509)
|
||||
return certpkey->x509;
|
||||
}
|
||||
|
||||
if (s->cert != NULL)
|
||||
return(s->cert->key->x509);
|
||||
else
|
||||
|
12
ssl/t1_lib.c
12
ssl/t1_lib.c
@ -2355,6 +2355,18 @@ int ssl_check_clienthello_tlsext_late(SSL *s)
|
||||
if ((s->tlsext_status_type != -1) && s->ctx && s->ctx->tlsext_status_cb)
|
||||
{
|
||||
int r;
|
||||
CERT_PKEY *certpkey;
|
||||
certpkey = ssl_get_server_send_pkey(s);
|
||||
/* If no certificate can't return certificate status */
|
||||
if (certpkey == NULL)
|
||||
{
|
||||
s->tlsext_status_expected = 0;
|
||||
return 1;
|
||||
}
|
||||
/* Set current certificate to one we will use so
|
||||
* SSL_get_certificate et al can pick it up.
|
||||
*/
|
||||
s->cert->key = certpkey;
|
||||
r = s->ctx->tlsext_status_cb(s, s->ctx->tlsext_status_arg);
|
||||
switch (r)
|
||||
{
|
||||
|
Loading…
x
Reference in New Issue
Block a user