aboutsummaryrefslogtreecommitdiff
path: root/src/daemon/https/tls/auth_cert.c
diff options
context:
space:
mode:
authorlv-426 <oxcafebaby@yahoo.com>2008-07-26 03:26:56 +0000
committerlv-426 <oxcafebaby@yahoo.com>2008-07-26 03:26:56 +0000
commit16abaea132ac90293a868ecb944abce24fd16d9f (patch)
tree490881a7b7ac6172608c2e9c9ba10d69160551b5 /src/daemon/https/tls/auth_cert.c
parent14a57219373afd8dd110ee8af89b32767c72c1dc (diff)
downloadlibmicrohttpd-16abaea132ac90293a868ecb944abce24fd16d9f.tar.gz
libmicrohttpd-16abaea132ac90293a868ecb944abce24fd16d9f.zip
'microhttps.h' merge
gnutls version added to configure.ac to enable assersion before running curl tests GNUTLS symbol renaming
Diffstat (limited to 'src/daemon/https/tls/auth_cert.c')
-rw-r--r--src/daemon/https/tls/auth_cert.c60
1 files changed, 30 insertions, 30 deletions
diff --git a/src/daemon/https/tls/auth_cert.c b/src/daemon/https/tls/auth_cert.c
index 43dcb777..c5c5d9f5 100644
--- a/src/daemon/https/tls/auth_cert.c
+++ b/src/daemon/https/tls/auth_cert.c
@@ -277,7 +277,7 @@ _find_openpgp_cert (const gnutls_certificate_credentials_t cred,
277 if ((_gnutls_check_pk_algo_in_list 277 if ((_gnutls_check_pk_algo_in_list
278 (pk_algos, pk_algos_length, 278 (pk_algos, pk_algos_length,
279 cred->cert_list[i][0].subject_pk_algorithm) == 0) 279 cred->cert_list[i][0].subject_pk_algorithm) == 0)
280 && (cred->cert_list[i][0].cert_type == GNUTLS_CRT_OPENPGP)) 280 && (cred->cert_list[i][0].cert_type == MHD_GNUTLS_CRT_OPENPGP))
281 { 281 {
282 *indx = i; 282 *indx = i;
283 break; 283 break;
@@ -350,7 +350,7 @@ get_issuers (gnutls_session_t session,
350 int i; 350 int i;
351 unsigned size; 351 unsigned size;
352 352
353 if (gnutls_certificate_type_get (session) != GNUTLS_CRT_X509) 353 if (gnutls_certificate_type_get (session) != MHD_GNUTLS_CRT_X509)
354 return 0; 354 return 0;
355 355
356 /* put the requested DNs to req_dn, only in case 356 /* put the requested DNs to req_dn, only in case
@@ -398,7 +398,7 @@ call_get_cert_callback (gnutls_session_t session,
398 gnutls_certificate_credentials_t cred; 398 gnutls_certificate_credentials_t cred;
399 399
400 cred = (gnutls_certificate_credentials_t) 400 cred = (gnutls_certificate_credentials_t)
401 _gnutls_get_cred (session->key, GNUTLS_CRD_CERTIFICATE, NULL); 401 _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL);
402 if (cred == NULL) 402 if (cred == NULL)
403 { 403 {
404 gnutls_assert (); 404 gnutls_assert ();
@@ -435,7 +435,7 @@ call_get_cert_callback (gnutls_session_t session,
435 goto cleanup; 435 goto cleanup;
436 } 436 }
437 437
438 if (type == GNUTLS_CRT_X509) 438 if (type == MHD_GNUTLS_CRT_X509)
439 { 439 {
440 local_certs = alloc_and_load_x509_certs (st.cert.x509, st.ncerts); 440 local_certs = alloc_and_load_x509_certs (st.cert.x509, st.ncerts);
441 if (local_certs != NULL) 441 if (local_certs != NULL)
@@ -465,7 +465,7 @@ call_get_cert_callback (gnutls_session_t session,
465 465
466cleanup: 466cleanup:
467 467
468 if (st.type == GNUTLS_CRT_X509) 468 if (st.type == MHD_GNUTLS_CRT_X509)
469 { 469 {
470 if (st.deinit_all) 470 if (st.deinit_all)
471 { 471 {
@@ -517,7 +517,7 @@ _select_client_cert (gnutls_session_t session,
517 gnutls_datum_t *issuers_dn = NULL; 517 gnutls_datum_t *issuers_dn = NULL;
518 518
519 cred = (gnutls_certificate_credentials_t) 519 cred = (gnutls_certificate_credentials_t)
520 _gnutls_get_cred (session->key, GNUTLS_CRD_CERTIFICATE, NULL); 520 _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL);
521 if (cred == NULL) 521 if (cred == NULL)
522 { 522 {
523 gnutls_assert (); 523 gnutls_assert ();
@@ -529,7 +529,7 @@ _select_client_cert (gnutls_session_t session,
529 529
530 /* use a callback to get certificate 530 /* use a callback to get certificate
531 */ 531 */
532 if (session->security_parameters.cert_type != GNUTLS_CRT_X509) 532 if (session->security_parameters.cert_type != MHD_GNUTLS_CRT_X509)
533 issuers_dn_length = 0; 533 issuers_dn_length = 0;
534 else 534 else
535 { 535 {
@@ -573,12 +573,12 @@ _select_client_cert (gnutls_session_t session,
573 */ 573 */
574 result = 0; 574 result = 0;
575 575
576 if (session->security_parameters.cert_type == GNUTLS_CRT_X509) 576 if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_X509)
577 result = 577 result =
578 _find_x509_cert (cred, _data, _data_size, 578 _find_x509_cert (cred, _data, _data_size,
579 pk_algos, pk_algos_length, &indx); 579 pk_algos, pk_algos_length, &indx);
580 580
581 if (session->security_parameters.cert_type == GNUTLS_CRT_OPENPGP) 581 if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_OPENPGP)
582 result = _find_openpgp_cert (cred, pk_algos, pk_algos_length, &indx); 582 result = _find_openpgp_cert (cred, pk_algos, pk_algos_length, &indx);
583 583
584 584
@@ -791,13 +791,13 @@ _gnutls_gen_cert_client_certificate (gnutls_session_t session, opaque ** data)
791{ 791{
792 switch (session->security_parameters.cert_type) 792 switch (session->security_parameters.cert_type)
793 { 793 {
794 case GNUTLS_CRT_OPENPGP: 794 case MHD_GNUTLS_CRT_OPENPGP:
795 if (_gnutls_openpgp_send_fingerprint (session) == 0) 795 if (_gnutls_openpgp_send_fingerprint (session) == 0)
796 return _gnutls_gen_openpgp_certificate (session, data); 796 return _gnutls_gen_openpgp_certificate (session, data);
797 else 797 else
798 return _gnutls_gen_openpgp_certificate_fpr (session, data); 798 return _gnutls_gen_openpgp_certificate_fpr (session, data);
799 799
800 case GNUTLS_CRT_X509: 800 case MHD_GNUTLS_CRT_X509:
801 return _gnutls_gen_x509_crt (session, data); 801 return _gnutls_gen_x509_crt (session, data);
802 802
803 default: 803 default:
@@ -811,9 +811,9 @@ _gnutls_gen_cert_server_certificate (gnutls_session_t session, opaque ** data)
811{ 811{
812 switch (session->security_parameters.cert_type) 812 switch (session->security_parameters.cert_type)
813 { 813 {
814 case GNUTLS_CRT_OPENPGP: 814 case MHD_GNUTLS_CRT_OPENPGP:
815 return _gnutls_gen_openpgp_certificate (session, data); 815 return _gnutls_gen_openpgp_certificate (session, data);
816 case GNUTLS_CRT_X509: 816 case MHD_GNUTLS_CRT_X509:
817 return _gnutls_gen_x509_crt (session, data); 817 return _gnutls_gen_x509_crt (session, data);
818 default: 818 default:
819 gnutls_assert (); 819 gnutls_assert ();
@@ -840,7 +840,7 @@ _gnutls_proc_x509_server_certificate (gnutls_session_t session,
840 gnutls_datum_t tmp; 840 gnutls_datum_t tmp;
841 841
842 cred = (gnutls_certificate_credentials_t) 842 cred = (gnutls_certificate_credentials_t)
843 _gnutls_get_cred (session->key, GNUTLS_CRD_CERTIFICATE, NULL); 843 _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL);
844 if (cred == NULL) 844 if (cred == NULL)
845 { 845 {
846 gnutls_assert (); 846 gnutls_assert ();
@@ -849,7 +849,7 @@ _gnutls_proc_x509_server_certificate (gnutls_session_t session,
849 849
850 850
851 if ((ret = 851 if ((ret =
852 _gnutls_auth_info_set (session, GNUTLS_CRD_CERTIFICATE, 852 _gnutls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE,
853 sizeof (cert_auth_info_st), 1)) < 0) 853 sizeof (cert_auth_info_st), 1)) < 0)
854 { 854 {
855 gnutls_assert (); 855 gnutls_assert ();
@@ -982,7 +982,7 @@ _gnutls_proc_openpgp_server_certificate (gnutls_session_t session,
982 gnutls_datum_t tmp, akey = { NULL, 0 }; 982 gnutls_datum_t tmp, akey = { NULL, 0 };
983 983
984 cred = (gnutls_certificate_credentials_t) 984 cred = (gnutls_certificate_credentials_t)
985 _gnutls_get_cred (session->key, GNUTLS_CRD_CERTIFICATE, NULL); 985 _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL);
986 if (cred == NULL) 986 if (cred == NULL)
987 { 987 {
988 gnutls_assert (); 988 gnutls_assert ();
@@ -990,7 +990,7 @@ _gnutls_proc_openpgp_server_certificate (gnutls_session_t session,
990 } 990 }
991 991
992 if ((ret = 992 if ((ret =
993 _gnutls_auth_info_set (session, GNUTLS_CRD_CERTIFICATE, 993 _gnutls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE,
994 sizeof (cert_auth_info_st), 1)) < 0) 994 sizeof (cert_auth_info_st), 1)) < 0)
995 { 995 {
996 gnutls_assert (); 996 gnutls_assert ();
@@ -1152,10 +1152,10 @@ _gnutls_proc_cert_server_certificate (gnutls_session_t session,
1152{ 1152{
1153 switch (session->security_parameters.cert_type) 1153 switch (session->security_parameters.cert_type)
1154 { 1154 {
1155 case GNUTLS_CRT_OPENPGP: 1155 case MHD_GNUTLS_CRT_OPENPGP:
1156 return _gnutls_proc_openpgp_server_certificate (session, 1156 return _gnutls_proc_openpgp_server_certificate (session,
1157 data, data_size); 1157 data, data_size);
1158 case GNUTLS_CRT_X509: 1158 case MHD_GNUTLS_CRT_X509:
1159 return _gnutls_proc_x509_server_certificate (session, data, data_size); 1159 return _gnutls_proc_x509_server_certificate (session, data, data_size);
1160 default: 1160 default:
1161 gnutls_assert (); 1161 gnutls_assert ();
@@ -1178,7 +1178,7 @@ _gnutls_check_supported_sign_algo (CertificateSigType algo)
1178 switch (algo) 1178 switch (algo)
1179 { 1179 {
1180 case RSA_SIGN: 1180 case RSA_SIGN:
1181 return GNUTLS_PK_RSA; 1181 return MHD_GNUTLS_PK_RSA;
1182 } 1182 }
1183 1183
1184 return -1; 1184 return -1;
@@ -1199,7 +1199,7 @@ _gnutls_proc_cert_cert_req (gnutls_session_t session, opaque * data,
1199 gnutls_protocol_t ver = gnutls_protocol_get_version (session); 1199 gnutls_protocol_t ver = gnutls_protocol_get_version (session);
1200 1200
1201 cred = (gnutls_certificate_credentials_t) 1201 cred = (gnutls_certificate_credentials_t)
1202 _gnutls_get_cred (session->key, GNUTLS_CRD_CERTIFICATE, NULL); 1202 _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL);
1203 if (cred == NULL) 1203 if (cred == NULL)
1204 { 1204 {
1205 gnutls_assert (); 1205 gnutls_assert ();
@@ -1207,7 +1207,7 @@ _gnutls_proc_cert_cert_req (gnutls_session_t session, opaque * data,
1207 } 1207 }
1208 1208
1209 if ((ret = 1209 if ((ret =
1210 _gnutls_auth_info_set (session, GNUTLS_CRD_CERTIFICATE, 1210 _gnutls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE,
1211 sizeof (cert_auth_info_st), 0)) < 0) 1211 sizeof (cert_auth_info_st), 0)) < 0)
1212 { 1212 {
1213 gnutls_assert (); 1213 gnutls_assert ();
@@ -1244,7 +1244,7 @@ _gnutls_proc_cert_cert_req (gnutls_session_t session, opaque * data,
1244 return GNUTLS_E_UNKNOWN_PK_ALGORITHM; 1244 return GNUTLS_E_UNKNOWN_PK_ALGORITHM;
1245 } 1245 }
1246 1246
1247 if (ver == GNUTLS_TLS1_2) 1247 if (ver == MHD_GNUTLS_TLS1_2)
1248 { 1248 {
1249 /* read supported hashes */ 1249 /* read supported hashes */
1250 int hash_num; 1250 int hash_num;
@@ -1262,7 +1262,7 @@ _gnutls_proc_cert_cert_req (gnutls_session_t session, opaque * data,
1262 size = _gnutls_read_uint16 (p); 1262 size = _gnutls_read_uint16 (p);
1263 p += 2; 1263 p += 2;
1264 1264
1265 if (session->security_parameters.cert_type == GNUTLS_CRT_OPENPGP 1265 if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_OPENPGP
1266 && size != 0) 1266 && size != 0)
1267 { 1267 {
1268 gnutls_assert (); // size should be zero 1268 gnutls_assert (); // size should be zero
@@ -1405,7 +1405,7 @@ _gnutls_gen_cert_server_cert_req (gnutls_session_t session, opaque ** data)
1405 */ 1405 */
1406 1406
1407 cred = (gnutls_certificate_credentials_t) 1407 cred = (gnutls_certificate_credentials_t)
1408 _gnutls_get_cred (session->key, GNUTLS_CRD_CERTIFICATE, NULL); 1408 _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL);
1409 if (cred == NULL) 1409 if (cred == NULL)
1410 { 1410 {
1411 gnutls_assert (); 1411 gnutls_assert ();
@@ -1415,11 +1415,11 @@ _gnutls_gen_cert_server_cert_req (gnutls_session_t session, opaque ** data)
1415 size = CERTTYPE_SIZE + 2; /* 2 for gnutls_certificate_type_t + 2 for size of rdn_seq 1415 size = CERTTYPE_SIZE + 2; /* 2 for gnutls_certificate_type_t + 2 for size of rdn_seq
1416 */ 1416 */
1417 1417
1418 if (session->security_parameters.cert_type == GNUTLS_CRT_X509 && 1418 if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_X509 &&
1419 session->internals.ignore_rdn_sequence == 0) 1419 session->internals.ignore_rdn_sequence == 0)
1420 size += cred->x509_rdn_sequence.size; 1420 size += cred->x509_rdn_sequence.size;
1421 1421
1422 if (ver == GNUTLS_TLS1_2) 1422 if (ver == MHD_GNUTLS_TLS1_2)
1423 /* Need at least one byte to announce the number of supported hash 1423 /* Need at least one byte to announce the number of supported hash
1424 functions (see below). */ 1424 functions (see below). */
1425 size += 1; 1425 size += 1;
@@ -1439,14 +1439,14 @@ _gnutls_gen_cert_server_cert_req (gnutls_session_t session, opaque ** data)
1439 pdata[2] = DSA_SIGN; /* only these for now */ 1439 pdata[2] = DSA_SIGN; /* only these for now */
1440 pdata += CERTTYPE_SIZE; 1440 pdata += CERTTYPE_SIZE;
1441 1441
1442 if (ver == GNUTLS_TLS1_2) 1442 if (ver == MHD_GNUTLS_TLS1_2)
1443 { 1443 {
1444 /* Supported hashes (nothing for now -- FIXME). */ 1444 /* Supported hashes (nothing for now -- FIXME). */
1445 *pdata = 0; 1445 *pdata = 0;
1446 pdata++; 1446 pdata++;
1447 } 1447 }
1448 1448
1449 if (session->security_parameters.cert_type == GNUTLS_CRT_X509 && 1449 if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_X509 &&
1450 session->internals.ignore_rdn_sequence == 0) 1450 session->internals.ignore_rdn_sequence == 0)
1451 { 1451 {
1452 _gnutls_write_datum16 (pdata, cred->x509_rdn_sequence); 1452 _gnutls_write_datum16 (pdata, cred->x509_rdn_sequence);
@@ -1717,7 +1717,7 @@ _gnutls_server_select_cert (gnutls_session_t session,
1717 gnutls_certificate_credentials_t cred; 1717 gnutls_certificate_credentials_t cred;
1718 1718
1719 cred = (gnutls_certificate_credentials_t) 1719 cred = (gnutls_certificate_credentials_t)
1720 _gnutls_get_cred (session->key, GNUTLS_CRD_CERTIFICATE, NULL); 1720 _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL);
1721 if (cred == NULL) 1721 if (cred == NULL)
1722 { 1722 {
1723 gnutls_assert (); 1723 gnutls_assert ();