Skip to content
Discussion options

You must be logged in to vote

https://datatracker.ietf.org/doc/html/rfc8446#section-2 has a diagram of the handshake messages.

The server presents its certificate in the Certificate part of the server handshake messages, and then follows that with CertificateVerify, which is a signature of the handshake (as they've written it) using the private key belonging to the certificate.

If the client can't verify the signature from CertificateVerify, the handshake fails before your callback is called (it's not recoverable).

So, by the time you see the callback, the certificate in cert is a) the certificate the server presented as their identity, and b) they've proven possession of the private key.

If your self-signed cert is p…

Replies: 3 comments 2 replies

Comment options

You must be logged in to vote
2 replies
@Clockwork-Muse
Comment options

@EricLVertiGIS
Comment options

Answer selected by EricLVertiGIS
Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
4 participants