⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ssl_cert.c

📁 mediastreamer2是开源的网络传输媒体流的库
💻 C
📖 第 1 页 / 共 2 页
字号:
/*! \file ssl/ssl_cert.c *//* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * * This package is an SSL implementation written * by Eric Young (eay@cryptsoft.com). * The implementation was written so as to conform with Netscapes SSL. *  * This library is free for commercial and non-commercial use as long as * the following conditions are aheared to.  The following conditions * apply to all code found in this distribution, be it the RC4, RSA, * lhash, DES, etc., code; not just the SSL code.  The SSL documentation * included with this distribution is covered by the same copyright terms * except that the holder is Tim Hudson (tjh@cryptsoft.com). *  * Copyright remains Eric Young's, and as such any Copyright notices in * the code are not to be removed. * If this package is used in a product, Eric Young should be given attribution * as the author of the parts of the library used. * This can be in the form of a textual message at program startup or * in documentation (online or textual) provided with the package. *  * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the copyright *    notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software *    must display the following acknowledgement: *    "This product includes cryptographic software written by *     Eric Young (eay@cryptsoft.com)" *    The word 'cryptographic' can be left out if the rouines from the library *    being used are not cryptographic related :-). * 4. If you include any Windows specific code (or a derivative thereof) from  *    the apps directory (application code) you must include an acknowledgement: *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" *  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. *  * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed.  i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] *//* ==================================================================== * Copyright (c) 1999 The OpenSSL Project.  All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer.  * * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in *    the documentation and/or other materials provided with the *    distribution. * * 3. All advertising materials mentioning features or use of this *    software must display the following acknowledgment: *    "This product includes software developed by the OpenSSL Project *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" * * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to *    endorse or promote products derived from this software without *    prior written permission. For written permission, please contact *    openssl-core@OpenSSL.org. * * 5. Products derived from this software may not be called "OpenSSL" *    nor may "OpenSSL" appear in their names without prior written *    permission of the OpenSSL Project. * * 6. Redistributions of any form whatsoever must retain the following *    acknowledgment: *    "This product includes software developed by the OpenSSL Project *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" * * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY OF SUCH DAMAGE. * ==================================================================== *//* ==================================================================== * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. * ECC cipher suite support in OpenSSL originally developed by  * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project. */#include <stdio.h>#include "e_os.h"#ifndef NO_SYS_TYPES_H# include <sys/types.h>#endif#include "o_dir.h"#include <openssl/objects.h>#include <openssl/bio.h>#include <openssl/pem.h>#include <openssl/x509v3.h>#ifndef OPENSSL_NO_DH#include <openssl/dh.h>#endif#include <openssl/bn.h>#include "ssl_locl.h"int SSL_get_ex_data_X509_STORE_CTX_idx(void)	{	static volatile int ssl_x509_store_ctx_idx= -1;	if (ssl_x509_store_ctx_idx < 0)		{		/* any write lock will do; usually this branch		 * will only be taken once anyway */		CRYPTO_w_lock(CRYPTO_LOCK_SSL_CTX);				if (ssl_x509_store_ctx_idx < 0)			{			ssl_x509_store_ctx_idx=X509_STORE_CTX_get_ex_new_index(				0,"SSL for verify callback",NULL,NULL,NULL);			}				CRYPTO_w_unlock(CRYPTO_LOCK_SSL_CTX);		}	return ssl_x509_store_ctx_idx;	}CERT *ssl_cert_new(void)	{	CERT *ret;	ret=(CERT *)OPENSSL_malloc(sizeof(CERT));	if (ret == NULL)		{		SSLerr(SSL_F_SSL_CERT_NEW,ERR_R_MALLOC_FAILURE);		return(NULL);		}	memset(ret,0,sizeof(CERT));	ret->key= &(ret->pkeys[SSL_PKEY_RSA_ENC]);	ret->references=1;	return(ret);	}CERT *ssl_cert_dup(CERT *cert)	{	CERT *ret;	int i;	ret = (CERT *)OPENSSL_malloc(sizeof(CERT));	if (ret == NULL)		{		SSLerr(SSL_F_SSL_CERT_DUP, ERR_R_MALLOC_FAILURE);		return(NULL);		}	memset(ret, 0, sizeof(CERT));	ret->key = &ret->pkeys[cert->key - &cert->pkeys[0]];	/* or ret->key = ret->pkeys + (cert->key - cert->pkeys),	 * if you find that more readable */	ret->valid = cert->valid;	ret->mask = cert->mask;	ret->export_mask = cert->export_mask;#ifndef OPENSSL_NO_RSA	if (cert->rsa_tmp != NULL)		{		RSA_up_ref(cert->rsa_tmp);		ret->rsa_tmp = cert->rsa_tmp;		}	ret->rsa_tmp_cb = cert->rsa_tmp_cb;#endif#ifndef OPENSSL_NO_DH	if (cert->dh_tmp != NULL)		{		ret->dh_tmp = DHparams_dup(cert->dh_tmp);		if (ret->dh_tmp == NULL)			{			SSLerr(SSL_F_SSL_CERT_DUP, ERR_R_DH_LIB);			goto err;			}		if (cert->dh_tmp->priv_key)			{			BIGNUM *b = BN_dup(cert->dh_tmp->priv_key);			if (!b)				{				SSLerr(SSL_F_SSL_CERT_DUP, ERR_R_BN_LIB);				goto err;				}			ret->dh_tmp->priv_key = b;			}		if (cert->dh_tmp->pub_key)			{			BIGNUM *b = BN_dup(cert->dh_tmp->pub_key);			if (!b)				{				SSLerr(SSL_F_SSL_CERT_DUP, ERR_R_BN_LIB);				goto err;				}			ret->dh_tmp->pub_key = b;			}		}	ret->dh_tmp_cb = cert->dh_tmp_cb;#endif#ifndef OPENSSL_NO_ECDH	if (cert->ecdh_tmp)		{		ret->ecdh_tmp = EC_KEY_dup(cert->ecdh_tmp);		if (ret->ecdh_tmp == NULL)			{			SSLerr(SSL_F_SSL_CERT_DUP, ERR_R_EC_LIB);			goto err;			}		}	ret->ecdh_tmp_cb = cert->ecdh_tmp_cb;#endif	for (i = 0; i < SSL_PKEY_NUM; i++)		{		if (cert->pkeys[i].x509 != NULL)			{			ret->pkeys[i].x509 = cert->pkeys[i].x509;			CRYPTO_add(&ret->pkeys[i].x509->references, 1,				CRYPTO_LOCK_X509);			}				if (cert->pkeys[i].privatekey != NULL)			{			ret->pkeys[i].privatekey = cert->pkeys[i].privatekey;			CRYPTO_add(&ret->pkeys[i].privatekey->references, 1,				CRYPTO_LOCK_EVP_PKEY);			switch(i) 				{				/* If there was anything special to do for				 * certain types of keys, we'd do it here.				 * (Nothing at the moment, I think.) */			case SSL_PKEY_RSA_ENC:			case SSL_PKEY_RSA_SIGN:				/* We have an RSA key. */				break;							case SSL_PKEY_DSA_SIGN:				/* We have a DSA key. */				break;							case SSL_PKEY_DH_RSA:			case SSL_PKEY_DH_DSA:				/* We have a DH key. */				break;			case SSL_PKEY_ECC:				/* We have an ECC key */				break;			default:				/* Can't happen. */				SSLerr(SSL_F_SSL_CERT_DUP, SSL_R_LIBRARY_BUG);				}			}		}		/* ret->extra_certs *should* exist, but currently the own certificate	 * chain is held inside SSL_CTX */	ret->references=1;	return(ret);	#ifndef OPENSSL_NO_DH /* avoid 'unreferenced label' warning if OPENSSL_NO_DH is defined */err:#endif#ifndef OPENSSL_NO_RSA	if (ret->rsa_tmp != NULL)		RSA_free(ret->rsa_tmp);#endif#ifndef OPENSSL_NO_DH	if (ret->dh_tmp != NULL)		DH_free(ret->dh_tmp);#endif#ifndef OPENSSL_NO_ECDH	if (ret->ecdh_tmp != NULL)		EC_KEY_free(ret->ecdh_tmp);#endif	for (i = 0; i < SSL_PKEY_NUM; i++)		{		if (ret->pkeys[i].x509 != NULL)			X509_free(ret->pkeys[i].x509);		if (ret->pkeys[i].privatekey != NULL)			EVP_PKEY_free(ret->pkeys[i].privatekey);		}	return NULL;	}void ssl_cert_free(CERT *c)	{	int i;	if(c == NULL)	    return;	i=CRYPTO_add(&c->references,-1,CRYPTO_LOCK_SSL_CERT);#ifdef REF_PRINT	REF_PRINT("CERT",c);#endif	if (i > 0) return;#ifdef REF_CHECK	if (i < 0)		{		fprintf(stderr,"ssl_cert_free, bad reference count\n");		abort(); /* ok */		}#endif#ifndef OPENSSL_NO_RSA	if (c->rsa_tmp) RSA_free(c->rsa_tmp);#endif#ifndef OPENSSL_NO_DH	if (c->dh_tmp) DH_free(c->dh_tmp);#endif#ifndef OPENSSL_NO_ECDH	if (c->ecdh_tmp) EC_KEY_free(c->ecdh_tmp);#endif	for (i=0; i<SSL_PKEY_NUM; i++)		{		if (c->pkeys[i].x509 != NULL)			X509_free(c->pkeys[i].x509);		if (c->pkeys[i].privatekey != NULL)			EVP_PKEY_free(c->pkeys[i].privatekey);#if 0		if (c->pkeys[i].publickey != NULL)			EVP_PKEY_free(c->pkeys[i].publickey);#endif		}	OPENSSL_free(c);	}int ssl_cert_inst(CERT **o)	{	/* Create a CERT if there isn't already one	 * (which cannot really happen, as it is initially created in	 * SSL_CTX_new; but the earlier code usually allows for that one	 * being non-existant, so we follow that behaviour, as it might	 * turn out that there actually is a reason for it -- but I'm	 * not sure that *all* of the existing code could cope with	 * s->cert being NULL, otherwise we could do without the	 * initialization in SSL_CTX_new).	 */		if (o == NULL) 		{		SSLerr(SSL_F_SSL_CERT_INST, ERR_R_PASSED_NULL_PARAMETER);		return(0);		}	if (*o == NULL)		{		if ((*o = ssl_cert_new()) == NULL)			{			SSLerr(SSL_F_SSL_CERT_INST, ERR_R_MALLOC_FAILURE);			return(0);			}		}	return(1);	}SESS_CERT *ssl_sess_cert_new(void)	{	SESS_CERT *ret;	ret = OPENSSL_malloc(sizeof *ret);	if (ret == NULL)		{		SSLerr(SSL_F_SSL_SESS_CERT_NEW, ERR_R_MALLOC_FAILURE);		return NULL;		}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -