diff options
author | Daniel Stenberg <daniel@haxx.se> | 2004-05-18 07:25:13 +0000 |
---|---|---|
committer | Daniel Stenberg <daniel@haxx.se> | 2004-05-18 07:25:13 +0000 |
commit | 2511d1193ac5ec176ca9ee5e583164979eacc90b (patch) | |
tree | ca4f20792bba4ed0bdf8538cb0ca5f56b6603049 | |
parent | e9056f5f957323dc09d44a2c038125334ce4f652 (diff) |
* seed_enough() was converted to a macro to avoid the IRIX compiler warning
about that passed-in argument not being used.
* killed trailing whitespace
-rw-r--r-- | lib/ssluse.c | 125 |
1 files changed, 65 insertions, 60 deletions
diff --git a/lib/ssluse.c b/lib/ssluse.c index 727a2e82a..20b6b7d45 100644 --- a/lib/ssluse.c +++ b/lib/ssluse.c @@ -1,8 +1,8 @@ /*************************************************************************** - * _ _ ____ _ - * Project ___| | | | _ \| | - * / __| | | | |_) | | - * | (__| |_| | _ <| |___ + * _ _ ____ _ + * Project ___| | | | _ \| | + * / __| | | | |_) | | + * | (__| |_| | _ <| |___ * \___|\___/|_| \_\_____| * * Copyright (C) 1998 - 2004, Daniel Stenberg, <daniel@haxx.se>, et al. @@ -10,7 +10,7 @@ * This software is licensed as described in the file COPYING, which * you should have received as part of this distribution. The terms * are also available at http://curl.haxx.se/docs/copyright.html. - * + * * You may opt to use, copy, modify, merge, publish, distribute and/or sell * copies of the Software, and permit persons to whom the Software is * furnished to do so, under the terms of the COPYING file. @@ -100,26 +100,31 @@ static int passwd_callback(char *buf, int num, int verify strcpy(buf, global_passwd); return (int)strlen(buf); } - } + } return 0; } -static -bool seed_enough(int nread) -{ -#ifdef HAVE_RAND_STATUS - nread = 0; /* to prevent compiler warnings */ +/* + * rand_enough() is a function that returns TRUE if we have seeded the random + * engine properly. We use some preprocessor magic to provide a seed_enough() + * macro to use, just to prevent a compiler warning on this function if we + * pass in an argument that is never used. + */ - /* only available in OpenSSL 0.9.5a and later */ - if(RAND_status()) - return TRUE; +#ifdef HAVE_RAND_STATUS +#define seed_enough(x) rand_enough() +static bool rand_enough(void) +{ + return RAND_status()?TRUE:FALSE; +} #else - if(nread > 500) - /* this is a very silly decision to make */ - return TRUE; -#endif - return FALSE; /* not enough */ +#define seed_enough(x) rand_enough(x) +static bool rand_enough(int nread) +{ + /* this is a very silly decision to make */ + return (nread > 500)?TRUE:FALSE; } +#endif static int random_the_seed(struct SessionHandle *data) @@ -183,12 +188,12 @@ int random_the_seed(struct SessionHandle *data) * being dependent upon the algorithm used by Curl_FormBoundary(): N bytes * of a 7-bit ascii set. -- Richard Gorton, March 11 2003. */ - + do { area = Curl_FormBoundary(); if(!area) return 3; /* out of memory */ - + len = (int)strlen(area); RAND_add(area, len, (len >> 1)); @@ -364,15 +369,15 @@ int cert_stuff(struct connectdata *conn, /* If we are using DSA, we can copy the parameters from * the private key */ - - + + /* Now we know that a key and cert have been set against * the SSL context */ if(!SSL_CTX_check_private_key(ctx)) { failf(data, "Private key does not match the certificate public key"); return(0); } -#ifndef HAVE_USERDATA_IN_PWD_CALLBACK +#ifndef HAVE_USERDATA_IN_PWD_CALLBACK /* erase it now */ memset(global_passwd, 0, sizeof(global_passwd)); #endif @@ -432,7 +437,7 @@ void Curl_SSL_cleanup(void) /* Free the SSL error strings */ ERR_free_strings(); - + /* EVP_cleanup() removes all ciphers and digests from the table. */ EVP_cleanup(); @@ -483,11 +488,11 @@ void Curl_SSL_Close(struct connectdata *conn) for(i=0; i<2; i++) { struct ssl_connect_data *connssl = &conn->ssl[i]; - + if(connssl->handle) { (void)SSL_shutdown(connssl->handle); SSL_set_connect_state(connssl->handle); - + SSL_free (connssl->handle); connssl->handle = NULL; } @@ -590,11 +595,11 @@ int Curl_SSL_Close_All(struct SessionHandle *data) { int i; - if(data->state.session) { + if(data->state.session) { for(i=0; i< data->set.ssl.numsessions; i++) /* the single-killer function handles empty table slots */ Kill_Single_Session(&data->state.session[i]); - + /* free the cache data */ free(data->state.session); } @@ -632,7 +637,7 @@ static int Store_SSL_Session(struct connectdata *conn, /* SSL_get1_session() will increment the reference count and the session will stay in memory until explicitly freed with - SSL_SESSION_free(3), regardless of its state. + SSL_SESSION_free(3), regardless of its state. This function was introduced in openssl 0.9.5a. */ #else ssl_sessionid = SSL_get_session(ssl->handle); @@ -641,9 +646,9 @@ static int Store_SSL_Session(struct connectdata *conn, This is an inferior option because the session can be flushed at any time by openssl. It is included only so curl compiles under versions of openssl < 0.9.5a. - + WARNING: How curl behaves if it's session is flushed is - untested. + untested. */ #endif @@ -663,7 +668,7 @@ static int Store_SSL_Session(struct connectdata *conn, Kill_Single_Session(store); else store = &data->state.session[i]; /* use this slot */ - + /* now init the session struct wisely */ store->sessionid = ssl_sessionid; store->age = data->state.sessionage; /* set current age */ @@ -714,7 +719,7 @@ static int Curl_ASN1_UTCTIME_output(struct connectdata *conn, if((asn1_string[10] >= '0') && (asn1_string[10] <= '9') && (asn1_string[11] >= '0') && (asn1_string[11] <= '9')) second= (asn1_string[10]-'0')*10+(asn1_string[11]-'0'); - + infof(data, "%s%04d-%02d-%02d %02d:%02d:%02d %s\n", prefix, year+1900, month, day, hour, minute, second, (gmt?"GMT":"")); @@ -722,7 +727,7 @@ static int Curl_ASN1_UTCTIME_output(struct connectdata *conn, return 0; } -#endif +#endif /* ====================================================== */ #ifdef USE_SSLEAY @@ -731,7 +736,7 @@ cert_hostcheck(const char *certname, const char *hostname) { char *tmp; const char *certdomain; - + if(!certname || strlen(certname)<3 || !hostname || @@ -745,7 +750,7 @@ cert_hostcheck(const char *certname, const char *hostname) if((certname[0] != '*') || (certdomain[0] != '.')) return 0; /* not a wildcard certificate, check failed */ - + if(!strchr(certdomain+1, '.')) return 0; /* the certificate must have at least another dot in its name */ @@ -797,9 +802,9 @@ static CURLcode verifyhost(struct connectdata *conn, #else struct in_addr addr; #endif - + #ifdef ENABLE_IPV6 - if(conn->bits.ipv6_ip && + if(conn->bits.ipv6_ip && Curl_inet_pton(AF_INET6, conn->host.name, &addr)) { target = GEN_IPADD; addrlen = sizeof(struct in6_addr); @@ -810,17 +815,17 @@ static CURLcode verifyhost(struct connectdata *conn, target = GEN_IPADD; addrlen = sizeof(struct in_addr); } - + /* get a "list" of alternative names */ altnames = X509_get_ext_d2i(server_cert, NID_subject_alt_name, NULL, NULL); - + if(altnames) { int hostlen = 0; int domainlen = 0; char *domain = NULL; int numalts; int i; - + if(GEN_DNS == target) { hostlen = (int)strlen(conn->host.name); domain = strchr(conn->host.name, '.'); @@ -849,15 +854,15 @@ static CURLcode verifyhost(struct connectdata *conn, if((hostlen == altlen) && curl_strnequal(conn->host.name, altptr, hostlen)) matched = TRUE; - + /* Is this a wildcard match? */ else if((altptr[0] == '*') && (domainlen == altlen-1) && curl_strnequal(domain, altptr+1, domainlen)) matched = TRUE; break; - - case GEN_IPADD: /* IP address comparison */ + + case GEN_IPADD: /* IP address comparison */ /* compare alternative IP address if the data chunk is the same size our server IP address is */ if((altlen == addrlen) && !memcmp(altptr, &addr, altlen)) @@ -868,7 +873,7 @@ static CURLcode verifyhost(struct connectdata *conn, } GENERAL_NAMES_free(altnames); } - + if(matched) /* an alternative name matched the server hostname */ infof(data, "\t subjectAltName: %s matched\n", conn->host.dispname); @@ -878,14 +883,14 @@ static CURLcode verifyhost(struct connectdata *conn, int j,i=-1 ; /* The following is done because of a bug in 0.9.6b */ - + unsigned char *nulstr = (unsigned char *)""; unsigned char *peer_CN = nulstr; - X509_NAME *name = X509_get_subject_name(server_cert) ; - if (name) - while ((j=X509_NAME_get_index_by_NID(name,NID_commonName,i))>=0) - i=j; + X509_NAME *name = X509_get_subject_name(server_cert) ; + if (name) + while ((j=X509_NAME_get_index_by_NID(name,NID_commonName,i))>=0) + i=j; /* we have the name entry and we will now convert this to a string that we can use for comparison. Doing this we support BMPstring, @@ -896,7 +901,7 @@ static CURLcode verifyhost(struct connectdata *conn, X509_NAME_ENTRY_get_data( X509_NAME_get_entry(name,i))); } - + if (peer_CN == nulstr) peer_CN = NULL; @@ -927,7 +932,7 @@ static CURLcode verifyhost(struct connectdata *conn, infof(data, "\t common name: %s (matched)\n", peer_CN); OPENSSL_free(peer_CN); } - } + } return CURLE_OK; } #endif @@ -977,7 +982,7 @@ Curl_SSLConnect(struct connectdata *conn, req_method = SSLv3_client_method(); break; } - + connssl->ctx = SSL_CTX_new(req_method); if(!connssl->ctx) { @@ -994,7 +999,7 @@ Curl_SSLConnect(struct connectdata *conn, */ SSL_CTX_set_options(connssl->ctx, SSL_OP_ALL); - + if(data->set.cert) { if(!cert_stuff(conn, connssl->ctx, @@ -1109,10 +1114,10 @@ Curl_SSLConnect(struct connectdata *conn, timeout_ms = data->set.timeout*1000; else timeout_ms = data->set.connecttimeout*1000; - + /* subtract the passed time */ timeout_ms -= has_passed; - + if(timeout_ms < 0) { /* a precaution, no need to continue if time already is up */ failf(data, "SSL connection timeout"); @@ -1221,7 +1226,7 @@ Curl_SSLConnect(struct connectdata *conn, Store_SSL_Session(conn, connssl); } - + /* Get server's certificate (note: beware of dynamic allocation) - opt */ /* major serious hack alert -- we should check certificates * to authenticate the server; otherwise we risk man-in-the-middle @@ -1234,7 +1239,7 @@ Curl_SSLConnect(struct connectdata *conn, return CURLE_SSL_PEER_CERTIFICATE; } infof (data, "Server certificate:\n"); - + str = X509_NAME_oneline(X509_get_subject_name(connssl->server_cert), NULL, 0); if(!str) { @@ -1271,7 +1276,7 @@ Curl_SSLConnect(struct connectdata *conn, /* We could do all sorts of certificate verification stuff here before deallocating the certificate. */ - + data->set.ssl.certverifyresult=SSL_get_verify_result(connssl->handle); if(data->set.ssl.certverifyresult != X509_V_OK) { if(data->set.ssl.verifypeer) { |