Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
d2f6d282
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
d2f6d282
编写于
6月 28, 2009
作者:
D
Dr. Stephen Henson
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Update from 0.9.8-stable.
上级
a5f78bf3
变更
3
隐藏空白更改
内联
并排
Showing
3 changed file
with
89 addition
and
91 deletion
+89
-91
CHANGES
CHANGES
+5
-0
ssl/d1_both.c
ssl/d1_both.c
+43
-48
ssl/s3_both.c
ssl/s3_both.c
+41
-43
未找到文件。
CHANGES
浏览文件 @
d2f6d282
...
...
@@ -808,6 +808,11 @@
Changes between 0.9.8k and 0.9.8l [xx XXX xxxx]
*) Fix the server certificate chain building code to use X509_verify_cert(),
it used to have an ad-hoc builder which was unable to cope with anything
other than a simple chain.
[David Woodhouse <dwmw2@infradead.org>, Steve Henson]
*) Don't check self signed certificate signatures in X509_verify_cert()
by default (a flag can override this): it just wastes time without
adding any security. As a useful side effect self signed root CAs
...
...
ssl/d1_both.c
浏览文件 @
d2f6d282
...
...
@@ -813,14 +813,30 @@ int dtls1_send_change_cipher_spec(SSL *s, int a, int b)
return
(
dtls1_do_write
(
s
,
SSL3_RT_CHANGE_CIPHER_SPEC
));
}
static
int
dtls1_add_cert_to_buf
(
BUF_MEM
*
buf
,
unsigned
long
*
l
,
X509
*
x
)
{
int
n
;
unsigned
char
*
p
;
n
=
i2d_X509
(
x
,
NULL
);
if
(
!
BUF_MEM_grow_clean
(
buf
,(
int
)(
n
+
(
*
l
)
+
3
)))
{
SSLerr
(
SSL_F_DTLS1_OUTPUT_CERT_CHAIN
,
ERR_R_BUF_LIB
);
return
0
;
}
p
=
(
unsigned
char
*
)
&
(
buf
->
data
[
*
l
]);
l2n3
(
n
,
p
);
i2d_X509
(
x
,
&
p
);
*
l
+=
n
+
3
;
return
1
;
}
unsigned
long
dtls1_output_cert_chain
(
SSL
*
s
,
X509
*
x
)
{
unsigned
char
*
p
;
int
n
,
i
;
int
i
;
unsigned
long
l
=
3
+
DTLS1_HM_HEADER_LENGTH
;
BUF_MEM
*
buf
;
X509_STORE_CTX
xs_ctx
;
X509_OBJECT
obj
;
/* TLSv1 sends a chain with nothing in it, instead of an alert */
buf
=
s
->
init_buf
;
...
...
@@ -831,54 +847,33 @@ unsigned long dtls1_output_cert_chain(SSL *s, X509 *x)
}
if
(
x
!=
NULL
)
{
if
(
!
X509_STORE_CTX_init
(
&
xs_ctx
,
s
->
ctx
->
cert_store
,
NULL
,
NULL
))
{
SSLerr
(
SSL_F_DTLS1_OUTPUT_CERT_CHAIN
,
ERR_R_X509_LIB
);
return
(
0
);
}
for
(;;)
{
n
=
i2d_X509
(
x
,
NULL
);
if
(
!
BUF_MEM_grow_clean
(
buf
,(
n
+
l
+
3
)))
{
SSLerr
(
SSL_F_DTLS1_OUTPUT_CERT_CHAIN
,
ERR_R_BUF_LIB
);
return
(
0
);
}
p
=
(
unsigned
char
*
)
&
(
buf
->
data
[
l
]);
l2n3
(
n
,
p
);
i2d_X509
(
x
,
&
p
);
l
+=
n
+
3
;
if
(
X509_NAME_cmp
(
X509_get_subject_name
(
x
),
X509_get_issuer_name
(
x
))
==
0
)
break
;
i
=
X509_STORE_get_by_subject
(
&
xs_ctx
,
X509_LU_X509
,
X509_get_issuer_name
(
x
),
&
obj
);
if
(
i
<=
0
)
break
;
x
=
obj
.
data
.
x509
;
/* Count is one too high since the X509_STORE_get uped the
* ref count */
X509_free
(
x
);
}
X509_STORE_CTX_cleanup
(
&
xs_ctx
);
}
/* Thawte special :-) */
if
(
s
->
ctx
->
extra_certs
!=
NULL
)
X509_STORE_CTX
xs_ctx
;
if
(
!
X509_STORE_CTX_init
(
&
xs_ctx
,
s
->
ctx
->
cert_store
,
x
,
NULL
))
{
SSLerr
(
SSL_F_DTLS1_OUTPUT_CERT_CHAIN
,
ERR_R_X509_LIB
);
return
(
0
);
}
X509_verify_cert
(
&
xs_ctx
);
for
(
i
=
0
;
i
<
sk_X509_num
(
xs_ctx
.
chain
);
i
++
)
{
x
=
sk_X509_value
(
xs_ctx
.
chain
,
i
);
if
(
!
dtls1_add_cert_to_buf
(
buf
,
&
l
,
x
))
{
X509_STORE_CTX_cleanup
(
&
xs_ctx
);
return
0
;
}
}
X509_STORE_CTX_cleanup
(
&
xs_ctx
);
}
/* Thawte special :-) */
for
(
i
=
0
;
i
<
sk_X509_num
(
s
->
ctx
->
extra_certs
);
i
++
)
{
x
=
sk_X509_value
(
s
->
ctx
->
extra_certs
,
i
);
n
=
i2d_X509
(
x
,
NULL
);
if
(
!
BUF_MEM_grow_clean
(
buf
,(
n
+
l
+
3
)))
{
SSLerr
(
SSL_F_DTLS1_OUTPUT_CERT_CHAIN
,
ERR_R_BUF_LIB
);
return
(
0
);
}
p
=
(
unsigned
char
*
)
&
(
buf
->
data
[
l
]);
l2n3
(
n
,
p
);
i2d_X509
(
x
,
&
p
);
l
+=
n
+
3
;
if
(
!
dtls1_add_cert_to_buf
(
buf
,
&
l
,
x
))
return
0
;
}
l
-=
(
3
+
DTLS1_HM_HEADER_LENGTH
);
...
...
ssl/s3_both.c
浏览文件 @
d2f6d282
...
...
@@ -262,15 +262,31 @@ int ssl3_send_change_cipher_spec(SSL *s, int a, int b)
return
(
ssl3_do_write
(
s
,
SSL3_RT_CHANGE_CIPHER_SPEC
));
}
static
int
ssl3_add_cert_to_buf
(
BUF_MEM
*
buf
,
unsigned
long
*
l
,
X509
*
x
)
{
int
n
;
unsigned
char
*
p
;
n
=
i2d_X509
(
x
,
NULL
);
if
(
!
BUF_MEM_grow_clean
(
buf
,(
int
)(
n
+
(
*
l
)
+
3
)))
{
SSLerr
(
SSL_F_SSL3_OUTPUT_CERT_CHAIN
,
ERR_R_BUF_LIB
);
return
(
-
1
);
}
p
=
(
unsigned
char
*
)
&
(
buf
->
data
[
*
l
]);
l2n3
(
n
,
p
);
i2d_X509
(
x
,
&
p
);
*
l
+=
n
+
3
;
return
(
0
);
}
unsigned
long
ssl3_output_cert_chain
(
SSL
*
s
,
X509
*
x
)
{
unsigned
char
*
p
;
int
n
,
i
;
int
i
;
unsigned
long
l
=
7
;
BUF_MEM
*
buf
;
X509_STORE_CTX
xs_ctx
;
X509_OBJECT
obj
;
int
no_chain
;
if
((
s
->
mode
&
SSL_MODE_NO_AUTO_CHAIN
)
||
s
->
ctx
->
extra_certs
)
...
...
@@ -287,58 +303,40 @@ unsigned long ssl3_output_cert_chain(SSL *s, X509 *x)
}
if
(
x
!=
NULL
)
{
if
(
!
no_chain
&&
!
X509_STORE_CTX_init
(
&
xs_ctx
,
s
->
ctx
->
cert_store
,
NULL
,
NULL
)
)
if
(
no_chain
)
{
SSLerr
(
SSL_F_SSL3_OUTPUT_CERT_CHAIN
,
ERR_R_X509_LIB
);
return
(
0
);
if
(
ssl3_add_cert_to_buf
(
buf
,
&
l
,
x
))
return
(
0
);
}
for
(;;)
else
{
n
=
i2d_X509
(
x
,
NULL
);
if
(
!
BUF_MEM_grow_clean
(
buf
,(
int
)(
n
+
l
+
3
)))
X509_STORE_CTX
xs_ctx
;
if
(
!
X509_STORE_CTX_init
(
&
xs_ctx
,
s
->
ctx
->
cert_store
,
x
,
NULL
))
{
SSLerr
(
SSL_F_SSL3_OUTPUT_CERT_CHAIN
,
ERR_R_
BUF
_LIB
);
SSLerr
(
SSL_F_SSL3_OUTPUT_CERT_CHAIN
,
ERR_R_
X509
_LIB
);
return
(
0
);
}
p
=
(
unsigned
char
*
)
&
(
buf
->
data
[
l
]);
l2n3
(
n
,
p
);
i2d_X509
(
x
,
&
p
);
l
+=
n
+
3
;
if
(
no_chain
)
break
;
if
(
X509_NAME_cmp
(
X509_get_subject_name
(
x
),
X509_get_issuer_name
(
x
))
==
0
)
break
;
i
=
X509_STORE_get_by_subject
(
&
xs_ctx
,
X509_LU_X509
,
X509_get_issuer_name
(
x
),
&
obj
);
if
(
i
<=
0
)
break
;
x
=
obj
.
data
.
x509
;
/* Count is one too high since the X509_STORE_get uped the
* ref count */
X509_free
(
x
);
}
if
(
!
no_chain
)
X509_verify_cert
(
&
xs_ctx
);
for
(
i
=
0
;
i
<
sk_X509_num
(
xs_ctx
.
chain
);
i
++
)
{
x
=
sk_X509_value
(
xs_ctx
.
chain
,
i
);
if
(
ssl3_add_cert_to_buf
(
buf
,
&
l
,
x
))
{
X509_STORE_CTX_cleanup
(
&
xs_ctx
);
return
0
;
}
}
X509_STORE_CTX_cleanup
(
&
xs_ctx
);
}
}
/* Thawte special :-) */
if
(
s
->
ctx
->
extra_certs
!=
NULL
)
for
(
i
=
0
;
i
<
sk_X509_num
(
s
->
ctx
->
extra_certs
);
i
++
)
{
x
=
sk_X509_value
(
s
->
ctx
->
extra_certs
,
i
);
n
=
i2d_X509
(
x
,
NULL
);
if
(
!
BUF_MEM_grow_clean
(
buf
,(
int
)(
n
+
l
+
3
)))
{
SSLerr
(
SSL_F_SSL3_OUTPUT_CERT_CHAIN
,
ERR_R_BUF_LIB
);
if
(
ssl3_add_cert_to_buf
(
buf
,
&
l
,
x
))
return
(
0
);
}
p
=
(
unsigned
char
*
)
&
(
buf
->
data
[
l
]);
l2n3
(
n
,
p
);
i2d_X509
(
x
,
&
p
);
l
+=
n
+
3
;
}
l
-=
7
;
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录