diff options
Diffstat (limited to 'src/daemon/https/tls/gnutls_kx.c')
-rw-r--r-- | src/daemon/https/tls/gnutls_kx.c | 66 |
1 files changed, 30 insertions, 36 deletions
diff --git a/src/daemon/https/tls/gnutls_kx.c b/src/daemon/https/tls/gnutls_kx.c index f1824f03..a4041e39 100644 --- a/src/daemon/https/tls/gnutls_kx.c +++ b/src/daemon/https/tls/gnutls_kx.c | |||
@@ -65,13 +65,13 @@ generate_normal_master (MHD_gtls_session_t session, int keep_premaster) | |||
65 | MHD_gtls_bin2hex (PREMASTER.data, PREMASTER.size, buf, | 65 | MHD_gtls_bin2hex (PREMASTER.data, PREMASTER.size, buf, |
66 | sizeof (buf))); | 66 | sizeof (buf))); |
67 | MHD__gnutls_hard_log ("INT: CLIENT RANDOM[%d]: %s\n", 32, | 67 | MHD__gnutls_hard_log ("INT: CLIENT RANDOM[%d]: %s\n", 32, |
68 | MHD_gtls_bin2hex (session-> | 68 | MHD_gtls_bin2hex (session->security_parameters. |
69 | security_parameters.client_random, | 69 | client_random, 32, buf, |
70 | 32, buf, sizeof (buf))); | 70 | sizeof (buf))); |
71 | MHD__gnutls_hard_log ("INT: SERVER RANDOM[%d]: %s\n", 32, | 71 | MHD__gnutls_hard_log ("INT: SERVER RANDOM[%d]: %s\n", 32, |
72 | MHD_gtls_bin2hex (session-> | 72 | MHD_gtls_bin2hex (session->security_parameters. |
73 | security_parameters.server_random, | 73 | server_random, 32, buf, |
74 | 32, buf, sizeof (buf))); | 74 | sizeof (buf))); |
75 | 75 | ||
76 | if (MHD__gnutls_protocol_get_version (session) == MHD_GNUTLS_PROTOCOL_SSL3) | 76 | if (MHD__gnutls_protocol_get_version (session) == MHD_GNUTLS_PROTOCOL_SSL3) |
77 | { | 77 | { |
@@ -86,8 +86,8 @@ generate_normal_master (MHD_gtls_session_t session, int keep_premaster) | |||
86 | MHD_gnutls_ssl3_generate_random (PREMASTER.data, PREMASTER.size, | 86 | MHD_gnutls_ssl3_generate_random (PREMASTER.data, PREMASTER.size, |
87 | rnd, 2 * TLS_RANDOM_SIZE, | 87 | rnd, 2 * TLS_RANDOM_SIZE, |
88 | TLS_MASTER_SIZE, | 88 | TLS_MASTER_SIZE, |
89 | session-> | 89 | session->security_parameters. |
90 | security_parameters.master_secret); | 90 | master_secret); |
91 | 91 | ||
92 | } | 92 | } |
93 | else | 93 | else |
@@ -117,9 +117,8 @@ generate_normal_master (MHD_gtls_session_t session, int keep_premaster) | |||
117 | return ret; | 117 | return ret; |
118 | 118 | ||
119 | MHD__gnutls_hard_log ("INT: MASTER SECRET: %s\n", | 119 | MHD__gnutls_hard_log ("INT: MASTER SECRET: %s\n", |
120 | MHD_gtls_bin2hex (session-> | 120 | MHD_gtls_bin2hex (session->security_parameters. |
121 | security_parameters.master_secret, | 121 | master_secret, TLS_MASTER_SIZE, buf, |
122 | TLS_MASTER_SIZE, buf, | ||
123 | sizeof (buf))); | 122 | sizeof (buf))); |
124 | 123 | ||
125 | return ret; | 124 | return ret; |
@@ -186,8 +185,8 @@ MHD_gtls_send_server_certificate_request (MHD_gtls_session_t session, | |||
186 | int data_size = 0; | 185 | int data_size = 0; |
187 | int ret = 0; | 186 | int ret = 0; |
188 | 187 | ||
189 | if (session->internals. | 188 | if (session->internals.auth_struct-> |
190 | auth_struct->MHD_gtls_gen_server_certificate_request == NULL) | 189 | MHD_gtls_gen_server_certificate_request == NULL) |
191 | return 0; | 190 | return 0; |
192 | 191 | ||
193 | if (session->internals.send_cert_req <= 0) | 192 | if (session->internals.send_cert_req <= 0) |
@@ -199,8 +198,8 @@ MHD_gtls_send_server_certificate_request (MHD_gtls_session_t session, | |||
199 | if (again == 0) | 198 | if (again == 0) |
200 | { | 199 | { |
201 | data_size = | 200 | data_size = |
202 | session->internals. | 201 | session->internals.auth_struct-> |
203 | auth_struct->MHD_gtls_gen_server_certificate_request (session, &data); | 202 | MHD_gtls_gen_server_certificate_request (session, &data); |
204 | 203 | ||
205 | if (data_size < 0) | 204 | if (data_size < 0) |
206 | { | 205 | { |
@@ -299,8 +298,8 @@ MHD_gtls_send_client_certificate_verify (MHD_gtls_session_t session, | |||
299 | if (again == 0) | 298 | if (again == 0) |
300 | { | 299 | { |
301 | data_size = | 300 | data_size = |
302 | session->internals. | 301 | session->internals.auth_struct-> |
303 | auth_struct->MHD_gtls_gen_client_cert_vrfy (session, &data); | 302 | MHD_gtls_gen_client_cert_vrfy (session, &data); |
304 | if (data_size < 0) | 303 | if (data_size < 0) |
305 | { | 304 | { |
306 | MHD_gnutls_assert (); | 305 | MHD_gnutls_assert (); |
@@ -372,8 +371,8 @@ MHD_gtls_recv_server_certificate_request (MHD_gtls_session_t session) | |||
372 | int datasize; | 371 | int datasize; |
373 | int ret = 0; | 372 | int ret = 0; |
374 | 373 | ||
375 | if (session->internals. | 374 | if (session->internals.auth_struct-> |
376 | auth_struct->MHD_gtls_process_server_certificate_request != NULL) | 375 | MHD_gtls_process_server_certificate_request != NULL) |
377 | { | 376 | { |
378 | 377 | ||
379 | ret = | 378 | ret = |
@@ -388,10 +387,8 @@ MHD_gtls_recv_server_certificate_request (MHD_gtls_session_t session) | |||
388 | return 0; /* ignored */ | 387 | return 0; /* ignored */ |
389 | 388 | ||
390 | ret = | 389 | ret = |
391 | session->internals. | 390 | session->internals.auth_struct-> |
392 | auth_struct->MHD_gtls_process_server_certificate_request (session, | 391 | MHD_gtls_process_server_certificate_request (session, data, datasize); |
393 | data, | ||
394 | datasize); | ||
395 | MHD_gnutls_free (data); | 392 | MHD_gnutls_free (data); |
396 | if (ret < 0) | 393 | if (ret < 0) |
397 | return ret; | 394 | return ret; |
@@ -462,8 +459,8 @@ MHD_gtls_send_client_certificate (MHD_gtls_session_t session, int again) | |||
462 | /* TLS 1.0 or SSL 3.0 with a valid certificate | 459 | /* TLS 1.0 or SSL 3.0 with a valid certificate |
463 | */ | 460 | */ |
464 | data_size = | 461 | data_size = |
465 | session->internals. | 462 | session->internals.auth_struct-> |
466 | auth_struct->MHD_gtls_gen_client_certificate (session, &data); | 463 | MHD_gtls_gen_client_certificate (session, &data); |
467 | 464 | ||
468 | if (data_size < 0) | 465 | if (data_size < 0) |
469 | { | 466 | { |
@@ -523,8 +520,8 @@ MHD_gtls_send_server_certificate (MHD_gtls_session_t session, int again) | |||
523 | if (again == 0) | 520 | if (again == 0) |
524 | { | 521 | { |
525 | data_size = | 522 | data_size = |
526 | session->internals. | 523 | session->internals.auth_struct-> |
527 | auth_struct->MHD_gtls_gen_server_certificate (session, &data); | 524 | MHD_gtls_gen_server_certificate (session, &data); |
528 | 525 | ||
529 | if (data_size < 0) | 526 | if (data_size < 0) |
530 | { | 527 | { |
@@ -620,9 +617,8 @@ MHD_gtls_recv_client_certificate (MHD_gtls_session_t session) | |||
620 | return 0; | 617 | return 0; |
621 | } | 618 | } |
622 | ret = | 619 | ret = |
623 | session->internals. | 620 | session->internals.auth_struct-> |
624 | auth_struct->MHD_gtls_process_client_certificate (session, data, | 621 | MHD_gtls_process_client_certificate (session, data, datasize); |
625 | datasize); | ||
626 | 622 | ||
627 | MHD_gnutls_free (data); | 623 | MHD_gnutls_free (data); |
628 | if (ret < 0 && ret != GNUTLS_E_NO_CERTIFICATE_FOUND) | 624 | if (ret < 0 && ret != GNUTLS_E_NO_CERTIFICATE_FOUND) |
@@ -666,9 +662,8 @@ MHD_gtls_recv_server_certificate (MHD_gtls_session_t session) | |||
666 | } | 662 | } |
667 | 663 | ||
668 | ret = | 664 | ret = |
669 | session->internals. | 665 | session->internals.auth_struct-> |
670 | auth_struct->MHD_gtls_process_server_certificate (session, data, | 666 | MHD_gtls_process_server_certificate (session, data, datasize); |
671 | datasize); | ||
672 | MHD_gnutls_free (data); | 667 | MHD_gnutls_free (data); |
673 | if (ret < 0) | 668 | if (ret < 0) |
674 | { | 669 | { |
@@ -719,9 +714,8 @@ MHD_gtls_recv_client_certificate_verify_message (MHD_gtls_session_t session) | |||
719 | } | 714 | } |
720 | 715 | ||
721 | ret = | 716 | ret = |
722 | session->internals. | 717 | session->internals.auth_struct-> |
723 | auth_struct->MHD_gtls_process_client_cert_vrfy (session, data, | 718 | MHD_gtls_process_client_cert_vrfy (session, data, datasize); |
724 | datasize); | ||
725 | MHD_gnutls_free (data); | 719 | MHD_gnutls_free (data); |
726 | if (ret < 0) | 720 | if (ret < 0) |
727 | return ret; | 721 | return ret; |