diff options
author | lv-426 <oxcafebaby@yahoo.com> | 2008-07-26 03:26:56 +0000 |
---|---|---|
committer | lv-426 <oxcafebaby@yahoo.com> | 2008-07-26 03:26:56 +0000 |
commit | 16abaea132ac90293a868ecb944abce24fd16d9f (patch) | |
tree | 490881a7b7ac6172608c2e9c9ba10d69160551b5 /src/daemon/https/tls/auth_cert.c | |
parent | 14a57219373afd8dd110ee8af89b32767c72c1dc (diff) | |
download | libmicrohttpd-16abaea132ac90293a868ecb944abce24fd16d9f.tar.gz libmicrohttpd-16abaea132ac90293a868ecb944abce24fd16d9f.zip |
'microhttps.h' merge
gnutls version added to configure.ac to enable assersion before running curl tests
GNUTLS symbol renaming
Diffstat (limited to 'src/daemon/https/tls/auth_cert.c')
-rw-r--r-- | src/daemon/https/tls/auth_cert.c | 60 |
1 files changed, 30 insertions, 30 deletions
diff --git a/src/daemon/https/tls/auth_cert.c b/src/daemon/https/tls/auth_cert.c index 43dcb777..c5c5d9f5 100644 --- a/src/daemon/https/tls/auth_cert.c +++ b/src/daemon/https/tls/auth_cert.c | |||
@@ -277,7 +277,7 @@ _find_openpgp_cert (const gnutls_certificate_credentials_t cred, | |||
277 | if ((_gnutls_check_pk_algo_in_list | 277 | if ((_gnutls_check_pk_algo_in_list |
278 | (pk_algos, pk_algos_length, | 278 | (pk_algos, pk_algos_length, |
279 | cred->cert_list[i][0].subject_pk_algorithm) == 0) | 279 | cred->cert_list[i][0].subject_pk_algorithm) == 0) |
280 | && (cred->cert_list[i][0].cert_type == GNUTLS_CRT_OPENPGP)) | 280 | && (cred->cert_list[i][0].cert_type == MHD_GNUTLS_CRT_OPENPGP)) |
281 | { | 281 | { |
282 | *indx = i; | 282 | *indx = i; |
283 | break; | 283 | break; |
@@ -350,7 +350,7 @@ get_issuers (gnutls_session_t session, | |||
350 | int i; | 350 | int i; |
351 | unsigned size; | 351 | unsigned size; |
352 | 352 | ||
353 | if (gnutls_certificate_type_get (session) != GNUTLS_CRT_X509) | 353 | if (gnutls_certificate_type_get (session) != MHD_GNUTLS_CRT_X509) |
354 | return 0; | 354 | return 0; |
355 | 355 | ||
356 | /* put the requested DNs to req_dn, only in case | 356 | /* put the requested DNs to req_dn, only in case |
@@ -398,7 +398,7 @@ call_get_cert_callback (gnutls_session_t session, | |||
398 | gnutls_certificate_credentials_t cred; | 398 | gnutls_certificate_credentials_t cred; |
399 | 399 | ||
400 | cred = (gnutls_certificate_credentials_t) | 400 | cred = (gnutls_certificate_credentials_t) |
401 | _gnutls_get_cred (session->key, GNUTLS_CRD_CERTIFICATE, NULL); | 401 | _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); |
402 | if (cred == NULL) | 402 | if (cred == NULL) |
403 | { | 403 | { |
404 | gnutls_assert (); | 404 | gnutls_assert (); |
@@ -435,7 +435,7 @@ call_get_cert_callback (gnutls_session_t session, | |||
435 | goto cleanup; | 435 | goto cleanup; |
436 | } | 436 | } |
437 | 437 | ||
438 | if (type == GNUTLS_CRT_X509) | 438 | if (type == MHD_GNUTLS_CRT_X509) |
439 | { | 439 | { |
440 | local_certs = alloc_and_load_x509_certs (st.cert.x509, st.ncerts); | 440 | local_certs = alloc_and_load_x509_certs (st.cert.x509, st.ncerts); |
441 | if (local_certs != NULL) | 441 | if (local_certs != NULL) |
@@ -465,7 +465,7 @@ call_get_cert_callback (gnutls_session_t session, | |||
465 | 465 | ||
466 | cleanup: | 466 | cleanup: |
467 | 467 | ||
468 | if (st.type == GNUTLS_CRT_X509) | 468 | if (st.type == MHD_GNUTLS_CRT_X509) |
469 | { | 469 | { |
470 | if (st.deinit_all) | 470 | if (st.deinit_all) |
471 | { | 471 | { |
@@ -517,7 +517,7 @@ _select_client_cert (gnutls_session_t session, | |||
517 | gnutls_datum_t *issuers_dn = NULL; | 517 | gnutls_datum_t *issuers_dn = NULL; |
518 | 518 | ||
519 | cred = (gnutls_certificate_credentials_t) | 519 | cred = (gnutls_certificate_credentials_t) |
520 | _gnutls_get_cred (session->key, GNUTLS_CRD_CERTIFICATE, NULL); | 520 | _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); |
521 | if (cred == NULL) | 521 | if (cred == NULL) |
522 | { | 522 | { |
523 | gnutls_assert (); | 523 | gnutls_assert (); |
@@ -529,7 +529,7 @@ _select_client_cert (gnutls_session_t session, | |||
529 | 529 | ||
530 | /* use a callback to get certificate | 530 | /* use a callback to get certificate |
531 | */ | 531 | */ |
532 | if (session->security_parameters.cert_type != GNUTLS_CRT_X509) | 532 | if (session->security_parameters.cert_type != MHD_GNUTLS_CRT_X509) |
533 | issuers_dn_length = 0; | 533 | issuers_dn_length = 0; |
534 | else | 534 | else |
535 | { | 535 | { |
@@ -573,12 +573,12 @@ _select_client_cert (gnutls_session_t session, | |||
573 | */ | 573 | */ |
574 | result = 0; | 574 | result = 0; |
575 | 575 | ||
576 | if (session->security_parameters.cert_type == GNUTLS_CRT_X509) | 576 | if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_X509) |
577 | result = | 577 | result = |
578 | _find_x509_cert (cred, _data, _data_size, | 578 | _find_x509_cert (cred, _data, _data_size, |
579 | pk_algos, pk_algos_length, &indx); | 579 | pk_algos, pk_algos_length, &indx); |
580 | 580 | ||
581 | if (session->security_parameters.cert_type == GNUTLS_CRT_OPENPGP) | 581 | if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_OPENPGP) |
582 | result = _find_openpgp_cert (cred, pk_algos, pk_algos_length, &indx); | 582 | result = _find_openpgp_cert (cred, pk_algos, pk_algos_length, &indx); |
583 | 583 | ||
584 | 584 | ||
@@ -791,13 +791,13 @@ _gnutls_gen_cert_client_certificate (gnutls_session_t session, opaque ** data) | |||
791 | { | 791 | { |
792 | switch (session->security_parameters.cert_type) | 792 | switch (session->security_parameters.cert_type) |
793 | { | 793 | { |
794 | case GNUTLS_CRT_OPENPGP: | 794 | case MHD_GNUTLS_CRT_OPENPGP: |
795 | if (_gnutls_openpgp_send_fingerprint (session) == 0) | 795 | if (_gnutls_openpgp_send_fingerprint (session) == 0) |
796 | return _gnutls_gen_openpgp_certificate (session, data); | 796 | return _gnutls_gen_openpgp_certificate (session, data); |
797 | else | 797 | else |
798 | return _gnutls_gen_openpgp_certificate_fpr (session, data); | 798 | return _gnutls_gen_openpgp_certificate_fpr (session, data); |
799 | 799 | ||
800 | case GNUTLS_CRT_X509: | 800 | case MHD_GNUTLS_CRT_X509: |
801 | return _gnutls_gen_x509_crt (session, data); | 801 | return _gnutls_gen_x509_crt (session, data); |
802 | 802 | ||
803 | default: | 803 | default: |
@@ -811,9 +811,9 @@ _gnutls_gen_cert_server_certificate (gnutls_session_t session, opaque ** data) | |||
811 | { | 811 | { |
812 | switch (session->security_parameters.cert_type) | 812 | switch (session->security_parameters.cert_type) |
813 | { | 813 | { |
814 | case GNUTLS_CRT_OPENPGP: | 814 | case MHD_GNUTLS_CRT_OPENPGP: |
815 | return _gnutls_gen_openpgp_certificate (session, data); | 815 | return _gnutls_gen_openpgp_certificate (session, data); |
816 | case GNUTLS_CRT_X509: | 816 | case MHD_GNUTLS_CRT_X509: |
817 | return _gnutls_gen_x509_crt (session, data); | 817 | return _gnutls_gen_x509_crt (session, data); |
818 | default: | 818 | default: |
819 | gnutls_assert (); | 819 | gnutls_assert (); |
@@ -840,7 +840,7 @@ _gnutls_proc_x509_server_certificate (gnutls_session_t session, | |||
840 | gnutls_datum_t tmp; | 840 | gnutls_datum_t tmp; |
841 | 841 | ||
842 | cred = (gnutls_certificate_credentials_t) | 842 | cred = (gnutls_certificate_credentials_t) |
843 | _gnutls_get_cred (session->key, GNUTLS_CRD_CERTIFICATE, NULL); | 843 | _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); |
844 | if (cred == NULL) | 844 | if (cred == NULL) |
845 | { | 845 | { |
846 | gnutls_assert (); | 846 | gnutls_assert (); |
@@ -849,7 +849,7 @@ _gnutls_proc_x509_server_certificate (gnutls_session_t session, | |||
849 | 849 | ||
850 | 850 | ||
851 | if ((ret = | 851 | if ((ret = |
852 | _gnutls_auth_info_set (session, GNUTLS_CRD_CERTIFICATE, | 852 | _gnutls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE, |
853 | sizeof (cert_auth_info_st), 1)) < 0) | 853 | sizeof (cert_auth_info_st), 1)) < 0) |
854 | { | 854 | { |
855 | gnutls_assert (); | 855 | gnutls_assert (); |
@@ -982,7 +982,7 @@ _gnutls_proc_openpgp_server_certificate (gnutls_session_t session, | |||
982 | gnutls_datum_t tmp, akey = { NULL, 0 }; | 982 | gnutls_datum_t tmp, akey = { NULL, 0 }; |
983 | 983 | ||
984 | cred = (gnutls_certificate_credentials_t) | 984 | cred = (gnutls_certificate_credentials_t) |
985 | _gnutls_get_cred (session->key, GNUTLS_CRD_CERTIFICATE, NULL); | 985 | _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); |
986 | if (cred == NULL) | 986 | if (cred == NULL) |
987 | { | 987 | { |
988 | gnutls_assert (); | 988 | gnutls_assert (); |
@@ -990,7 +990,7 @@ _gnutls_proc_openpgp_server_certificate (gnutls_session_t session, | |||
990 | } | 990 | } |
991 | 991 | ||
992 | if ((ret = | 992 | if ((ret = |
993 | _gnutls_auth_info_set (session, GNUTLS_CRD_CERTIFICATE, | 993 | _gnutls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE, |
994 | sizeof (cert_auth_info_st), 1)) < 0) | 994 | sizeof (cert_auth_info_st), 1)) < 0) |
995 | { | 995 | { |
996 | gnutls_assert (); | 996 | gnutls_assert (); |
@@ -1152,10 +1152,10 @@ _gnutls_proc_cert_server_certificate (gnutls_session_t session, | |||
1152 | { | 1152 | { |
1153 | switch (session->security_parameters.cert_type) | 1153 | switch (session->security_parameters.cert_type) |
1154 | { | 1154 | { |
1155 | case GNUTLS_CRT_OPENPGP: | 1155 | case MHD_GNUTLS_CRT_OPENPGP: |
1156 | return _gnutls_proc_openpgp_server_certificate (session, | 1156 | return _gnutls_proc_openpgp_server_certificate (session, |
1157 | data, data_size); | 1157 | data, data_size); |
1158 | case GNUTLS_CRT_X509: | 1158 | case MHD_GNUTLS_CRT_X509: |
1159 | return _gnutls_proc_x509_server_certificate (session, data, data_size); | 1159 | return _gnutls_proc_x509_server_certificate (session, data, data_size); |
1160 | default: | 1160 | default: |
1161 | gnutls_assert (); | 1161 | gnutls_assert (); |
@@ -1178,7 +1178,7 @@ _gnutls_check_supported_sign_algo (CertificateSigType algo) | |||
1178 | switch (algo) | 1178 | switch (algo) |
1179 | { | 1179 | { |
1180 | case RSA_SIGN: | 1180 | case RSA_SIGN: |
1181 | return GNUTLS_PK_RSA; | 1181 | return MHD_GNUTLS_PK_RSA; |
1182 | } | 1182 | } |
1183 | 1183 | ||
1184 | return -1; | 1184 | return -1; |
@@ -1199,7 +1199,7 @@ _gnutls_proc_cert_cert_req (gnutls_session_t session, opaque * data, | |||
1199 | gnutls_protocol_t ver = gnutls_protocol_get_version (session); | 1199 | gnutls_protocol_t ver = gnutls_protocol_get_version (session); |
1200 | 1200 | ||
1201 | cred = (gnutls_certificate_credentials_t) | 1201 | cred = (gnutls_certificate_credentials_t) |
1202 | _gnutls_get_cred (session->key, GNUTLS_CRD_CERTIFICATE, NULL); | 1202 | _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); |
1203 | if (cred == NULL) | 1203 | if (cred == NULL) |
1204 | { | 1204 | { |
1205 | gnutls_assert (); | 1205 | gnutls_assert (); |
@@ -1207,7 +1207,7 @@ _gnutls_proc_cert_cert_req (gnutls_session_t session, opaque * data, | |||
1207 | } | 1207 | } |
1208 | 1208 | ||
1209 | if ((ret = | 1209 | if ((ret = |
1210 | _gnutls_auth_info_set (session, GNUTLS_CRD_CERTIFICATE, | 1210 | _gnutls_auth_info_set (session, MHD_GNUTLS_CRD_CERTIFICATE, |
1211 | sizeof (cert_auth_info_st), 0)) < 0) | 1211 | sizeof (cert_auth_info_st), 0)) < 0) |
1212 | { | 1212 | { |
1213 | gnutls_assert (); | 1213 | gnutls_assert (); |
@@ -1244,7 +1244,7 @@ _gnutls_proc_cert_cert_req (gnutls_session_t session, opaque * data, | |||
1244 | return GNUTLS_E_UNKNOWN_PK_ALGORITHM; | 1244 | return GNUTLS_E_UNKNOWN_PK_ALGORITHM; |
1245 | } | 1245 | } |
1246 | 1246 | ||
1247 | if (ver == GNUTLS_TLS1_2) | 1247 | if (ver == MHD_GNUTLS_TLS1_2) |
1248 | { | 1248 | { |
1249 | /* read supported hashes */ | 1249 | /* read supported hashes */ |
1250 | int hash_num; | 1250 | int hash_num; |
@@ -1262,7 +1262,7 @@ _gnutls_proc_cert_cert_req (gnutls_session_t session, opaque * data, | |||
1262 | size = _gnutls_read_uint16 (p); | 1262 | size = _gnutls_read_uint16 (p); |
1263 | p += 2; | 1263 | p += 2; |
1264 | 1264 | ||
1265 | if (session->security_parameters.cert_type == GNUTLS_CRT_OPENPGP | 1265 | if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_OPENPGP |
1266 | && size != 0) | 1266 | && size != 0) |
1267 | { | 1267 | { |
1268 | gnutls_assert (); // size should be zero | 1268 | gnutls_assert (); // size should be zero |
@@ -1405,7 +1405,7 @@ _gnutls_gen_cert_server_cert_req (gnutls_session_t session, opaque ** data) | |||
1405 | */ | 1405 | */ |
1406 | 1406 | ||
1407 | cred = (gnutls_certificate_credentials_t) | 1407 | cred = (gnutls_certificate_credentials_t) |
1408 | _gnutls_get_cred (session->key, GNUTLS_CRD_CERTIFICATE, NULL); | 1408 | _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); |
1409 | if (cred == NULL) | 1409 | if (cred == NULL) |
1410 | { | 1410 | { |
1411 | gnutls_assert (); | 1411 | gnutls_assert (); |
@@ -1415,11 +1415,11 @@ _gnutls_gen_cert_server_cert_req (gnutls_session_t session, opaque ** data) | |||
1415 | size = CERTTYPE_SIZE + 2; /* 2 for gnutls_certificate_type_t + 2 for size of rdn_seq | 1415 | size = CERTTYPE_SIZE + 2; /* 2 for gnutls_certificate_type_t + 2 for size of rdn_seq |
1416 | */ | 1416 | */ |
1417 | 1417 | ||
1418 | if (session->security_parameters.cert_type == GNUTLS_CRT_X509 && | 1418 | if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_X509 && |
1419 | session->internals.ignore_rdn_sequence == 0) | 1419 | session->internals.ignore_rdn_sequence == 0) |
1420 | size += cred->x509_rdn_sequence.size; | 1420 | size += cred->x509_rdn_sequence.size; |
1421 | 1421 | ||
1422 | if (ver == GNUTLS_TLS1_2) | 1422 | if (ver == MHD_GNUTLS_TLS1_2) |
1423 | /* Need at least one byte to announce the number of supported hash | 1423 | /* Need at least one byte to announce the number of supported hash |
1424 | functions (see below). */ | 1424 | functions (see below). */ |
1425 | size += 1; | 1425 | size += 1; |
@@ -1439,14 +1439,14 @@ _gnutls_gen_cert_server_cert_req (gnutls_session_t session, opaque ** data) | |||
1439 | pdata[2] = DSA_SIGN; /* only these for now */ | 1439 | pdata[2] = DSA_SIGN; /* only these for now */ |
1440 | pdata += CERTTYPE_SIZE; | 1440 | pdata += CERTTYPE_SIZE; |
1441 | 1441 | ||
1442 | if (ver == GNUTLS_TLS1_2) | 1442 | if (ver == MHD_GNUTLS_TLS1_2) |
1443 | { | 1443 | { |
1444 | /* Supported hashes (nothing for now -- FIXME). */ | 1444 | /* Supported hashes (nothing for now -- FIXME). */ |
1445 | *pdata = 0; | 1445 | *pdata = 0; |
1446 | pdata++; | 1446 | pdata++; |
1447 | } | 1447 | } |
1448 | 1448 | ||
1449 | if (session->security_parameters.cert_type == GNUTLS_CRT_X509 && | 1449 | if (session->security_parameters.cert_type == MHD_GNUTLS_CRT_X509 && |
1450 | session->internals.ignore_rdn_sequence == 0) | 1450 | session->internals.ignore_rdn_sequence == 0) |
1451 | { | 1451 | { |
1452 | _gnutls_write_datum16 (pdata, cred->x509_rdn_sequence); | 1452 | _gnutls_write_datum16 (pdata, cred->x509_rdn_sequence); |
@@ -1717,7 +1717,7 @@ _gnutls_server_select_cert (gnutls_session_t session, | |||
1717 | gnutls_certificate_credentials_t cred; | 1717 | gnutls_certificate_credentials_t cred; |
1718 | 1718 | ||
1719 | cred = (gnutls_certificate_credentials_t) | 1719 | cred = (gnutls_certificate_credentials_t) |
1720 | _gnutls_get_cred (session->key, GNUTLS_CRD_CERTIFICATE, NULL); | 1720 | _gnutls_get_cred (session->key, MHD_GNUTLS_CRD_CERTIFICATE, NULL); |
1721 | if (cred == NULL) | 1721 | if (cred == NULL) |
1722 | { | 1722 | { |
1723 | gnutls_assert (); | 1723 | gnutls_assert (); |