diff options
author | venaas <venaas> | 2007-02-06 14:39:20 +0000 |
---|---|---|
committer | venaas <venaas@e88ac4ed-0b26-0410-9574-a7f39faa03bf> | 2007-02-06 14:39:20 +0000 |
commit | 82496fa8343bceeb3aa27326890209cc9645acdc (patch) | |
tree | 68927d38c790bf1aa1d8ca0d934c698e1059f062 | |
parent | 8040719e3686b862ffac2717dab587ae566552bf (diff) |
removed tls test code
git-svn-id: https://svn.testnett.uninett.no/radsecproxy/trunk@46 e88ac4ed-0b26-0410-9574-a7f39faa03bf
-rw-r--r-- | radsecproxy.c | 65 |
1 files changed, 7 insertions, 58 deletions
diff --git a/radsecproxy.c b/radsecproxy.c index db89b6a..2776520 100644 --- a/radsecproxy.c +++ b/radsecproxy.c @@ -122,19 +122,22 @@ static int verify_cb(int ok, X509_STORE_CTX *ctx) { break; } } - printf("certificate verify returns %d\n", ok); + // printf("certificate verify returns %d\n", ok); return ok; } void ssl_init(SSL_CTX **ctx_srv, SSL_CTX **ctx_cl) { int i; unsigned long error; - STACK_OF(X509_NAME) *calist; if (!options.tlscertificatefile || !options.tlscertificatekeyfile) { printf("TLSCertificateFile and TLSCertificateKeyFile must be specified for TLS\n"); exit(1); } + if (!options.tlscacertificatefile && !options.tlscacertificatepath) { + printf("CA Certificate file/path need to be configured\n"); + exit(1); + } ssl_locks = malloc(CRYPTO_num_locks() * sizeof(pthread_mutex_t)); ssl_lock_count = OPENSSL_malloc(CRYPTO_num_locks() * sizeof(long)); @@ -155,62 +158,14 @@ void ssl_init(SSL_CTX **ctx_srv, SSL_CTX **ctx_cl) { RAND_seed((unsigned char *)&pid, sizeof(pid)); } -#if 0 if (ctx_srv) { *ctx_srv = SSL_CTX_new(TLSv1_server_method()); if (!SSL_CTX_use_certificate_chain_file(*ctx_srv, options.tlscertificatefile) || !SSL_CTX_use_PrivateKey_file(*ctx_srv, options.tlscertificatekeyfile, SSL_FILETYPE_PEM) || !SSL_CTX_check_private_key(*ctx_srv)) goto errexit; -#if 1 -#if 1 - calist = (options.tlscacertificatefile - ? SSL_load_client_CA_file(options.tlscacertificatefile) - : sk_X509_NAME_new_null()); - if (!calist || (options.tlscacertificatepath && - !SSL_add_dir_cert_subjects_to_stack(calist, options.tlscacertificatepath))) - goto errexit; - SSL_CTX_set_client_CA_list(*ctx_srv, calist); -#endif - if (!options.tlscacertificatefile && !options.tlscacertificatepath) { - printf("CA Certificate file/path need to be configured\n"); - exit(1); - } if (!SSL_CTX_load_verify_locations(*ctx_srv, options.tlscacertificatefile, options.tlscacertificatepath)) goto errexit; - SSL_CTX_set_verify(*ctx_srv, SSL_VERIFY_PEER, verify_cb); - SSL_CTX_set_verify_depth(*ctx_srv, MAX_CERT_DEPTH + 1); -#endif - } - if (ctx_cl) { - *ctx_cl = SSL_CTX_new(TLSv1_client_method()); - if (!SSL_CTX_use_certificate_chain_file(*ctx_cl, options.tlscertificatefile) || - !SSL_CTX_use_PrivateKey_file(*ctx_cl, options.tlscertificatekeyfile, SSL_FILETYPE_PEM) || - !SSL_CTX_check_private_key(*ctx_cl)) - goto errexit; - if (!options.tlscacertificatefile && !options.tlscacertificatepath) { - printf("CA Certificate file/path need to be configured\n"); - exit(1); - } - if (!SSL_CTX_load_verify_locations(*ctx_cl, options.tlscacertificatefile, options.tlscacertificatepath)) - goto errexit; - SSL_CTX_set_verify(*ctx_cl, SSL_VERIFY_PEER, verify_cb); - SSL_CTX_set_verify_depth(*ctx_cl, MAX_CERT_DEPTH + 1); - } -#else - if (ctx_srv) { - *ctx_srv = SSL_CTX_new(TLSv1_server_method()); - if (!SSL_CTX_use_certificate_chain_file(*ctx_srv, options.tlscertificatefile) || - !SSL_CTX_use_PrivateKey_file(*ctx_srv, options.tlscertificatekeyfile, SSL_FILETYPE_PEM) || - !SSL_CTX_check_private_key(*ctx_srv)) - goto errexit; -#if 0 - calist = (SSL_load_client_CA_file(options.tlscacertificatefile)); - SSL_CTX_set_client_CA_list(*ctx_srv, calist); -#endif - if (!SSL_CTX_load_verify_locations(*ctx_srv, options.tlscacertificatefile, NULL/*options.tlscacertificatepath*/)) - goto errexit; - SSL_CTX_set_verify(*ctx_srv, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT, verify_cb); SSL_CTX_set_verify_depth(*ctx_srv, MAX_CERT_DEPTH + 1); } @@ -220,17 +175,11 @@ void ssl_init(SSL_CTX **ctx_srv, SSL_CTX **ctx_cl) { !SSL_CTX_use_PrivateKey_file(*ctx_cl, options.tlscertificatekeyfile, SSL_FILETYPE_PEM) || !SSL_CTX_check_private_key(*ctx_cl)) goto errexit; - if (!SSL_CTX_load_verify_locations(*ctx_cl,options.tlscacertificatefile, NULL/*options.tlscacertificatepath*/)) + if (!SSL_CTX_load_verify_locations(*ctx_cl, options.tlscacertificatefile, options.tlscacertificatepath)) goto errexit; - SSL_CTX_set_verify(*ctx_cl, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT, verify_cb); SSL_CTX_set_verify_depth(*ctx_cl, MAX_CERT_DEPTH + 1); -#if 0 - calist = (SSL_load_client_CA_file(options.tlscacertificatefile)); - SSL_CTX_set_client_CA_list(*ctx_cl, calist); -#endif } -#endif return; errexit: @@ -1512,7 +1461,7 @@ void *tlsserverrd(void *arg) { errx("accept failed, child exiting"); } - if (1 /*tlsverifycert(&client->peer)*/) { + if (tlsverifycert(&client->peer)) { if (pthread_create(&tlsserverwrth, NULL, tlsserverwr, (void *)client)) errx("pthread_create failed"); |