Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
08c23970
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
08c23970
编写于
1月 28, 2010
作者:
D
Dr. Stephen Henson
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Experimental renegotiation support in s_server test -www server.
上级
92714455
变更
2
隐藏空白更改
内联
并排
Showing
2 changed file
with
36 addition
and
1 deletion
+36
-1
CHANGES
CHANGES
+5
-0
apps/s_server.c
apps/s_server.c
+31
-1
未找到文件。
CHANGES
浏览文件 @
08c23970
...
...
@@ -4,6 +4,11 @@
Changes between 1.0.0 and 1.1.0 [xx XXX xxxx]
*) Experiemental regnegotiation in s_server -www mode. If the client
browsers /reneg connection is renegotiated. If /renegcert it is
renegotiated requestion a certificate.
[Steve Henson]
*) Add an "external" session cache for debugging purposes to s_server. This
should help trace issues which normally are only apparent in deployed
multi-process servers.
...
...
apps/s_server.c
浏览文件 @
08c23970
...
...
@@ -2324,7 +2324,6 @@ static int www_body(char *hostname, int s, unsigned char *context)
}
SSL_set_bio
(
con
,
sbio
,
sbio
);
SSL_set_accept_state
(
con
);
/* SSL_set_fd(con,s); */
BIO_set_ssl
(
ssl_bio
,
con
,
BIO_CLOSE
);
BIO_push
(
io
,
ssl_bio
);
...
...
@@ -2406,6 +2405,32 @@ static int www_body(char *hostname, int s, unsigned char *context)
STACK_OF
(
SSL_CIPHER
)
*
sk
;
static
const
char
*
space
=
" "
;
if
(
www
==
1
&&
strncmp
(
"GET /reneg"
,
buf
,
10
)
==
0
)
{
if
(
strncmp
(
"GET /renegcert"
,
buf
,
14
)
==
0
)
SSL_set_verify
(
con
,
SSL_VERIFY_PEER
|
SSL_VERIFY_CLIENT_ONCE
,
NULL
);
i
=
SSL_renegotiate
(
con
);
BIO_printf
(
bio_s_out
,
"SSL_renegotiate -> %d
\n
"
,
i
);
i
=
SSL_do_handshake
(
con
);
if
(
i
<=
0
)
{
BIO_printf
(
bio_s_out
,
"SSL_do_handshake() Retval %d
\n
"
,
SSL_get_error
(
con
,
i
));
ERR_print_errors
(
bio_err
);
goto
err
;
}
/* EVIL HACK! */
con
->
state
=
SSL_ST_ACCEPT
;
i
=
SSL_do_handshake
(
con
);
BIO_printf
(
bio_s_out
,
"SSL_do_handshake -> %d
\n
"
,
i
);
if
(
i
<=
0
)
{
BIO_printf
(
bio_s_out
,
"SSL_do_handshake() Retval %d
\n
"
,
SSL_get_error
(
con
,
i
));
ERR_print_errors
(
bio_err
);
goto
err
;
}
}
BIO_puts
(
io
,
"HTTP/1.0 200 ok
\r\n
Content-type: text/html
\r\n\r\n
"
);
BIO_puts
(
io
,
"<HTML><BODY BGCOLOR=
\"
#ffffff
\"
>
\n
"
);
BIO_puts
(
io
,
"<pre>
\n
"
);
...
...
@@ -2418,6 +2443,11 @@ static int www_body(char *hostname, int s, unsigned char *context)
}
BIO_puts
(
io
,
"
\n
"
);
BIO_printf
(
io
,
"Secure Renegotiation IS%s supported
\n
"
,
SSL_get_secure_renegotiation_support
(
con
)
?
""
:
" NOT"
);
/* The following is evil and should not really
* be done */
BIO_printf
(
io
,
"Ciphers supported in s_server binary
\n
"
);
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录