diff options
Diffstat (limited to 'src/lib/libssl/ssl_lib.c')
-rw-r--r-- | src/lib/libssl/ssl_lib.c | 53 |
1 files changed, 18 insertions, 35 deletions
diff --git a/src/lib/libssl/ssl_lib.c b/src/lib/libssl/ssl_lib.c index 6dbc3c1f7d..c91f0018e4 100644 --- a/src/lib/libssl/ssl_lib.c +++ b/src/lib/libssl/ssl_lib.c | |||
@@ -597,10 +597,8 @@ void SSL_free(SSL *s) | |||
597 | OPENSSL_free(s->next_proto_negotiated); | 597 | OPENSSL_free(s->next_proto_negotiated); |
598 | #endif | 598 | #endif |
599 | 599 | ||
600 | #ifndef OPENSSL_NO_SRTP | ||
601 | if (s->srtp_profiles) | 600 | if (s->srtp_profiles) |
602 | sk_SRTP_PROTECTION_PROFILE_free(s->srtp_profiles); | 601 | sk_SRTP_PROTECTION_PROFILE_free(s->srtp_profiles); |
603 | #endif | ||
604 | 602 | ||
605 | OPENSSL_free(s); | 603 | OPENSSL_free(s); |
606 | } | 604 | } |
@@ -1338,36 +1336,33 @@ int SSL_set_cipher_list(SSL *s,const char *str) | |||
1338 | /* works well for SSLv2, not so good for SSLv3 */ | 1336 | /* works well for SSLv2, not so good for SSLv3 */ |
1339 | char *SSL_get_shared_ciphers(const SSL *s,char *buf,int len) | 1337 | char *SSL_get_shared_ciphers(const SSL *s,char *buf,int len) |
1340 | { | 1338 | { |
1341 | char *p; | 1339 | char *end; |
1342 | STACK_OF(SSL_CIPHER) *sk; | 1340 | STACK_OF(SSL_CIPHER) *sk; |
1343 | SSL_CIPHER *c; | 1341 | SSL_CIPHER *c; |
1342 | size_t curlen = 0; | ||
1344 | int i; | 1343 | int i; |
1345 | 1344 | ||
1346 | if ((s->session == NULL) || (s->session->ciphers == NULL) || | 1345 | if ((s->session == NULL) || (s->session->ciphers == NULL) || |
1347 | (len < 2)) | 1346 | (len < 2)) |
1348 | return(NULL); | 1347 | return(NULL); |
1349 | 1348 | ||
1350 | p=buf; | ||
1351 | sk=s->session->ciphers; | 1349 | sk=s->session->ciphers; |
1350 | buf[0] = '\0'; | ||
1352 | for (i=0; i<sk_SSL_CIPHER_num(sk); i++) | 1351 | for (i=0; i<sk_SSL_CIPHER_num(sk); i++) |
1353 | { | 1352 | { |
1354 | int n; | ||
1355 | |||
1356 | c=sk_SSL_CIPHER_value(sk,i); | 1353 | c=sk_SSL_CIPHER_value(sk,i); |
1357 | n=strlen(c->name); | 1354 | end = buf + curlen; |
1358 | if (n+1 > len) | 1355 | if (strlcat(buf, c->name, len) >= len || |
1356 | (curlen = strlcat(buf, ":", len)) >= len) | ||
1359 | { | 1357 | { |
1360 | if (p != buf) | 1358 | /* remove truncated cipher from list */ |
1361 | --p; | 1359 | *end = '\0'; |
1362 | *p='\0'; | 1360 | break; |
1363 | return buf; | ||
1364 | } | 1361 | } |
1365 | strcpy(p,c->name); | ||
1366 | p+=n; | ||
1367 | *(p++)=':'; | ||
1368 | len-=n+1; | ||
1369 | } | 1362 | } |
1370 | p[-1]='\0'; | 1363 | /* remove trailing colon */ |
1364 | if ((end = strrchr(buf, ':')) != NULL) | ||
1365 | *end = '\0'; | ||
1371 | return(buf); | 1366 | return(buf); |
1372 | } | 1367 | } |
1373 | 1368 | ||
@@ -1797,9 +1792,7 @@ SSL_CTX *SSL_CTX_new(const SSL_METHOD *meth) | |||
1797 | CRYPTO_new_ex_data(CRYPTO_EX_INDEX_SSL_CTX, ret, &ret->ex_data); | 1792 | CRYPTO_new_ex_data(CRYPTO_EX_INDEX_SSL_CTX, ret, &ret->ex_data); |
1798 | 1793 | ||
1799 | ret->extra_certs=NULL; | 1794 | ret->extra_certs=NULL; |
1800 | /* No compression for DTLS */ | 1795 | ret->comp_methods=SSL_COMP_get_compression_methods(); |
1801 | if (meth->version != DTLS1_VERSION) | ||
1802 | ret->comp_methods=SSL_COMP_get_compression_methods(); | ||
1803 | 1796 | ||
1804 | ret->max_send_fragment = SSL3_RT_MAX_PLAIN_LENGTH; | 1797 | ret->max_send_fragment = SSL3_RT_MAX_PLAIN_LENGTH; |
1805 | 1798 | ||
@@ -1956,10 +1949,8 @@ void SSL_CTX_free(SSL_CTX *a) | |||
1956 | a->comp_methods = NULL; | 1949 | a->comp_methods = NULL; |
1957 | #endif | 1950 | #endif |
1958 | 1951 | ||
1959 | #ifndef OPENSSL_NO_SRTP | ||
1960 | if (a->srtp_profiles) | 1952 | if (a->srtp_profiles) |
1961 | sk_SRTP_PROTECTION_PROFILE_free(a->srtp_profiles); | 1953 | sk_SRTP_PROTECTION_PROFILE_free(a->srtp_profiles); |
1962 | #endif | ||
1963 | 1954 | ||
1964 | #ifndef OPENSSL_NO_PSK | 1955 | #ifndef OPENSSL_NO_PSK |
1965 | if (a->psk_identity_hint) | 1956 | if (a->psk_identity_hint) |
@@ -2293,7 +2284,7 @@ int ssl_check_srvr_ecc_cert_and_alg(X509 *x, SSL *s) | |||
2293 | #endif | 2284 | #endif |
2294 | 2285 | ||
2295 | /* THIS NEEDS CLEANING UP */ | 2286 | /* THIS NEEDS CLEANING UP */ |
2296 | CERT_PKEY *ssl_get_server_send_pkey(const SSL *s) | 2287 | X509 *ssl_get_server_send_cert(SSL *s) |
2297 | { | 2288 | { |
2298 | unsigned long alg_k,alg_a; | 2289 | unsigned long alg_k,alg_a; |
2299 | CERT *c; | 2290 | CERT *c; |
@@ -2348,20 +2339,12 @@ CERT_PKEY *ssl_get_server_send_pkey(const SSL *s) | |||
2348 | i=SSL_PKEY_GOST01; | 2339 | i=SSL_PKEY_GOST01; |
2349 | else /* if (alg_a & SSL_aNULL) */ | 2340 | else /* if (alg_a & SSL_aNULL) */ |
2350 | { | 2341 | { |
2351 | SSLerr(SSL_F_SSL_GET_SERVER_SEND_PKEY,ERR_R_INTERNAL_ERROR); | 2342 | SSLerr(SSL_F_SSL_GET_SERVER_SEND_CERT,ERR_R_INTERNAL_ERROR); |
2352 | return(NULL); | 2343 | return(NULL); |
2353 | } | 2344 | } |
2345 | if (c->pkeys[i].x509 == NULL) return(NULL); | ||
2354 | 2346 | ||
2355 | return c->pkeys + i; | 2347 | return(c->pkeys[i].x509); |
2356 | } | ||
2357 | |||
2358 | X509 *ssl_get_server_send_cert(const SSL *s) | ||
2359 | { | ||
2360 | CERT_PKEY *cpk; | ||
2361 | cpk = ssl_get_server_send_pkey(s); | ||
2362 | if (!cpk) | ||
2363 | return NULL; | ||
2364 | return cpk->x509; | ||
2365 | } | 2348 | } |
2366 | 2349 | ||
2367 | EVP_PKEY *ssl_get_sign_pkey(SSL *s,const SSL_CIPHER *cipher, const EVP_MD **pmd) | 2350 | EVP_PKEY *ssl_get_sign_pkey(SSL *s,const SSL_CIPHER *cipher, const EVP_MD **pmd) |
@@ -2622,7 +2605,7 @@ const char *SSL_get_version(const SSL *s) | |||
2622 | return("TLSv1.2"); | 2605 | return("TLSv1.2"); |
2623 | else if (s->version == TLS1_1_VERSION) | 2606 | else if (s->version == TLS1_1_VERSION) |
2624 | return("TLSv1.1"); | 2607 | return("TLSv1.1"); |
2625 | else if (s->version == TLS1_VERSION) | 2608 | if (s->version == TLS1_VERSION) |
2626 | return("TLSv1"); | 2609 | return("TLSv1"); |
2627 | else if (s->version == SSL3_VERSION) | 2610 | else if (s->version == SSL3_VERSION) |
2628 | return("SSLv3"); | 2611 | return("SSLv3"); |