aboutsummaryrefslogtreecommitdiff
path: root/lib
diff options
context:
space:
mode:
authorDaniel Stenberg <daniel@haxx.se>2003-10-23 07:44:55 +0000
committerDaniel Stenberg <daniel@haxx.se>2003-10-23 07:44:55 +0000
commit14f795816d445b4dfab19884b24ebacb8596f1f9 (patch)
tree88dd6fc08936b61cfa0fba0541fd32d879e6934c /lib
parent5987791516c4a7e35c457b2cc381a88c47bafb02 (diff)
Georg Horn's fixes to do different CA cert verifications. They can now be
done even if the result is ignored, as some sites seem to require that.
Diffstat (limited to 'lib')
-rw-r--r--lib/ssluse.c87
1 files changed, 60 insertions, 27 deletions
diff --git a/lib/ssluse.c b/lib/ssluse.c
index 0caa4ddfd..67e457ce2 100644
--- a/lib/ssluse.c
+++ b/lib/ssluse.c
@@ -975,21 +975,46 @@ Curl_SSLConnect(struct connectdata *conn)
}
}
- if(data->set.ssl.verifypeer) {
- SSL_CTX_set_verify(conn->ssl.ctx,
- SSL_VERIFY_PEER|SSL_VERIFY_FAIL_IF_NO_PEER_CERT|
- SSL_VERIFY_CLIENT_ONCE,
- cert_verify_callback);
- if((data->set.ssl.CAfile || data->set.ssl.CApath) &&
- !SSL_CTX_load_verify_locations(conn->ssl.ctx,
- data->set.ssl.CAfile,
- data->set.ssl.CApath)) {
- failf(data,"error setting certificate verify locations");
- return CURLE_SSL_CACERT;
+ if (data->set.ssl.CAfile || data->set.ssl.CApath) {
+ /* tell SSL where to find CA certificates that are used to verify
+ the servers certificate. */
+ if (!SSL_CTX_load_verify_locations(conn->ssl.ctx, data->set.ssl.CAfile,
+ data->set.ssl.CApath)) {
+ if (data->set.ssl.verifypeer) {
+ /* Fail if we insist on successfully verifying the server. */
+ failf(data,"error setting certificate verify locations:\n"
+ " CAfile: %s\n CApath: %s\n",
+ data->set.ssl.CAfile ? data->set.ssl.CAfile : "none",
+ data->set.ssl.CApath ? data->set.ssl.CApath : "none");
+ return CURLE_SSL_CACERT;
+ }
+ else {
+ /* Just continue with a warning if no strict certificate verification
+ is required. */
+ infof(data,"error setting certificate verify locations,"
+ " continuing anyway:\n");
+ infof(data, " CAfile: %s\n",
+ data->set.ssl.CAfile ? data->set.ssl.CAfile : "none");
+ infof(data, " CApath: %s\n",
+ data->set.ssl.CApath ? data->set.ssl.CApath : "none");
+ }
+ }
+ else {
+ /* Everything is fine. */
+ infof(data,"successfully set certificate verify locations:\n");
+ infof(data, " CAfile: %s\n",
+ data->set.ssl.CAfile ? data->set.ssl.CAfile : "none");
+ infof(data, " CApath: %s\n",
+ data->set.ssl.CApath ? data->set.ssl.CApath : "none");
}
}
- else
- SSL_CTX_set_verify(conn->ssl.ctx, SSL_VERIFY_NONE, cert_verify_callback);
+ /* SSL always tries to verify the peer, this only says whether it should
+ * fail to connect if the verification fails, or if it should continue
+ * anyway. In the latter case the result of the verification is checked with
+ * SSL_get_verify_result() below. */
+ SSL_CTX_set_verify(conn->ssl.ctx,
+ data->set.ssl.verifypeer?SSL_VERIFY_PEER:SSL_VERIFY_NONE,
+ cert_verify_callback);
/* give application a chance to interfere with SSL set up. */
if(data->set.ssl.fsslctx) {
@@ -1175,33 +1200,41 @@ Curl_SSLConnect(struct connectdata *conn)
if(data->set.ssl.verifyhost) {
retcode = verifyhost(conn);
- if(retcode)
+ if(retcode) {
+ X509_free(conn->ssl.server_cert);
return retcode;
+ }
}
str = X509_NAME_oneline(X509_get_issuer_name(conn->ssl.server_cert),
NULL, 0);
if(!str) {
failf(data, "SSL: couldn't get X509-issuer name!");
- X509_free(conn->ssl.server_cert);
- return CURLE_SSL_CONNECT_ERROR;
+ retcode = CURLE_SSL_CONNECT_ERROR;
}
- infof(data, "\t issuer: %s\n", str);
- CRYPTO_free(str);
-
- /* We could do all sorts of certificate verification stuff here before
- deallocating the certificate. */
+ else {
+ infof(data, "\t issuer: %s\n", str);
+ CRYPTO_free(str);
- if(data->set.ssl.verifypeer) {
+ /* We could do all sorts of certificate verification stuff here before
+ deallocating the certificate. */
+
data->set.ssl.certverifyresult=SSL_get_verify_result(conn->ssl.handle);
if(data->set.ssl.certverifyresult != X509_V_OK) {
- failf(data, "SSL certificate verify result: %d",
- data->set.ssl.certverifyresult);
- retcode = CURLE_SSL_PEER_CERTIFICATE;
+ if(data->set.ssl.verifypeer) {
+ /* We probably never reach this, because SSL_connect() will fail
+ and we return earlyer if verifypeer is set? */
+ failf(data, "SSL certificate verify result: %d",
+ data->set.ssl.certverifyresult);
+ retcode = CURLE_SSL_PEER_CERTIFICATE;
+ }
+ else
+ infof(data, "SSL certificate verify result: %d, continuing anyway.\n",
+ data->set.ssl.certverifyresult);
}
+ else
+ infof(data, "SSL certificate verify ok.\n");
}
- else
- data->set.ssl.certverifyresult=0;
X509_free(conn->ssl.server_cert);
#else /* USE_SSLEAY */