Commit eec0774e662fb67f25179070a86db5a236274269
1 parent
1311e80f
Exists in
master
and in
3 other branches
Updating windows code.
Showing
5 changed files
with
152 additions
and
208 deletions
Show diff stats
lib3270.cbp
@@ -219,7 +219,7 @@ | @@ -219,7 +219,7 @@ | ||
219 | <Unit filename="src/lib3270/ssl/state.c"> | 219 | <Unit filename="src/lib3270/ssl/state.c"> |
220 | <Option compilerVar="CC" /> | 220 | <Option compilerVar="CC" /> |
221 | </Unit> | 221 | </Unit> |
222 | - <Unit filename="src/lib3270/ssl/windows/ctx_init.c"> | 222 | + <Unit filename="src/lib3270/ssl/windows/getcrl.c"> |
223 | <Option compilerVar="CC" /> | 223 | <Option compilerVar="CC" /> |
224 | </Unit> | 224 | </Unit> |
225 | <Unit filename="src/lib3270/state.c"> | 225 | <Unit filename="src/lib3270/state.c"> |
src/include/config.h.in
@@ -61,11 +61,6 @@ | @@ -61,11 +61,6 @@ | ||
61 | #undef SSL_ENABLE_CRL_EXPIRATION_CHECK | 61 | #undef SSL_ENABLE_CRL_EXPIRATION_CHECK |
62 | #undef SSL_DEFAULT_CRL_URL | 62 | #undef SSL_DEFAULT_CRL_URL |
63 | 63 | ||
64 | - /* Windows Options */ | ||
65 | -#ifdef WIN32 | ||
66 | - #undef HAVE_WIN_REGISTRY | ||
67 | -#endif // WIN32 | ||
68 | - | ||
69 | /* Optional parts. */ | 64 | /* Optional parts. */ |
70 | #undef X3270_DBCS | 65 | #undef X3270_DBCS |
71 | #undef X3270_SCRIPT | 66 | #undef X3270_SCRIPT |
src/lib3270/session.c
@@ -254,6 +254,11 @@ static void set_peer_certificate)(const void *cert unused) | @@ -254,6 +254,11 @@ static void set_peer_certificate)(const void *cert unused) | ||
254 | } | 254 | } |
255 | #endif // HAVE_LIBSSL | 255 | #endif // HAVE_LIBSSL |
256 | 256 | ||
257 | +static void default_update_luname(H3270 *session unused, const char *name unused) | ||
258 | +{ | ||
259 | + | ||
260 | +} | ||
261 | + | ||
257 | void lib3270_reset_callbacks(H3270 *hSession) | 262 | void lib3270_reset_callbacks(H3270 *hSession) |
258 | { | 263 | { |
259 | // Default calls | 264 | // Default calls |
@@ -283,7 +288,7 @@ void lib3270_reset_callbacks(H3270 *hSession) | @@ -283,7 +288,7 @@ void lib3270_reset_callbacks(H3270 *hSession) | ||
283 | hSession->cbk.set_timer = set_timer; | 288 | hSession->cbk.set_timer = set_timer; |
284 | hSession->cbk.print = print; | 289 | hSession->cbk.print = print; |
285 | hSession->cbk.set_peer_certificate = set_peer_certificate; | 290 | hSession->cbk.set_peer_certificate = set_peer_certificate; |
286 | - hSession->cbk.update_luname = (void (*)(H3270 *, const char *)) nop_int; | 291 | + hSession->cbk.update_luname = default_update_luname; |
287 | 292 | ||
288 | } | 293 | } |
289 | 294 | ||
@@ -298,7 +303,7 @@ static void lib3270_session_init(H3270 *hSession, const char *model, const char | @@ -298,7 +303,7 @@ static void lib3270_session_init(H3270 *hSession, const char *model, const char | ||
298 | lib3270_reset_callbacks(hSession); | 303 | lib3270_reset_callbacks(hSession); |
299 | 304 | ||
300 | // Trace management. | 305 | // Trace management. |
301 | - hSession->trace.handler = def_trace; | 306 | + hSession->trace.handler = def_trace; |
302 | 307 | ||
303 | // Set the defaults. | 308 | // Set the defaults. |
304 | hSession->extended = 1; | 309 | hSession->extended = 1; |
src/lib3270/ssl/linux/getcrl.c
@@ -150,23 +150,6 @@ static size_t internal_curl_write_callback(void *contents, size_t size, size_t n | @@ -150,23 +150,6 @@ static size_t internal_curl_write_callback(void *contents, size_t size, size_t n | ||
150 | memcpy(&(data->contents[data->length]),contents,realsize); | 150 | memcpy(&(data->contents[data->length]),contents,realsize); |
151 | data->length += realsize; | 151 | data->length += realsize; |
152 | 152 | ||
153 | - /* | ||
154 | - struct MemoryStruct *mem = (struct MemoryStruct *)userp; | ||
155 | - | ||
156 | - char *ptr = realloc(mem->memory, mem->size + realsize + 1); | ||
157 | - if(ptr == NULL) { | ||
158 | - printf("not enough memory (realloc returned NULL)\n"); | ||
159 | - return 0; | ||
160 | - } | ||
161 | - | ||
162 | - mem->memory = ptr; | ||
163 | - memcpy(&(mem->memory[mem->size]), contents, realsize); | ||
164 | - mem->size += realsize; | ||
165 | - mem->memory[mem->size] = 0; | ||
166 | - | ||
167 | - */ | ||
168 | - | ||
169 | - | ||
170 | return realsize; | 153 | return realsize; |
171 | } | 154 | } |
172 | 155 |
src/lib3270/ssl/windows/getcrl.c
@@ -33,7 +33,10 @@ | @@ -33,7 +33,10 @@ | ||
33 | * | 33 | * |
34 | */ | 34 | */ |
35 | 35 | ||
36 | +#define CRL_DATA_LENGTH 4096 | ||
37 | + | ||
36 | #include <config.h> | 38 | #include <config.h> |
39 | + | ||
37 | #if defined(HAVE_LIBSSL) && defined(SSL_ENABLE_CRL_CHECK) | 40 | #if defined(HAVE_LIBSSL) && defined(SSL_ENABLE_CRL_CHECK) |
38 | 41 | ||
39 | #include <openssl/ssl.h> | 42 | #include <openssl/ssl.h> |
@@ -41,10 +44,9 @@ | @@ -41,10 +44,9 @@ | ||
41 | #include <openssl/x509_vfy.h> | 44 | #include <openssl/x509_vfy.h> |
42 | #include <openssl/x509.h> | 45 | #include <openssl/x509.h> |
43 | 46 | ||
44 | -#ifdef HAVE_LDAP | ||
45 | - #define LDAP_DEPRECATED 1 | ||
46 | - #include <ldap.h> | ||
47 | -#endif // HAVE_LDAP | 47 | +#ifdef HAVE_LIBCURL |
48 | + #include <curl/curl.h> | ||
49 | +#endif // HAVE_LIBCURL | ||
48 | 50 | ||
49 | #include "../../private.h" | 51 | #include "../../private.h" |
50 | #include <trace_dsc.h> | 52 | #include <trace_dsc.h> |
@@ -59,66 +61,80 @@ static inline void lib3270_autoptr_cleanup_FILE(FILE **file) | @@ -59,66 +61,80 @@ static inline void lib3270_autoptr_cleanup_FILE(FILE **file) | ||
59 | fclose(*file); | 61 | fclose(*file); |
60 | } | 62 | } |
61 | 63 | ||
62 | -#ifdef HAVE_LDAP | ||
63 | -static inline void lib3270_autoptr_cleanup_LDAPMessage(LDAPMessage **message) | 64 | +#ifdef HAVE_LIBCURL |
65 | +static inline void lib3270_autoptr_cleanup_CURL(CURL **ptr) | ||
64 | { | 66 | { |
65 | - debug("%s(%p)",__FUNCTION__,*message); | ||
66 | - if(message) | ||
67 | - ldap_msgfree(*message); | ||
68 | - *message = NULL; | 67 | + debug("%s(%p)",__FUNCTION__,*ptr); |
68 | + if(*ptr) | ||
69 | + curl_easy_cleanup(*ptr); | ||
70 | + *ptr = NULL; | ||
69 | } | 71 | } |
70 | 72 | ||
71 | -static inline void lib3270_autoptr_cleanup_LDAP(LDAP **ld) | 73 | +typedef struct _curldata |
72 | { | 74 | { |
73 | - debug("%s(%p)",__FUNCTION__,*ld); | ||
74 | - if(*ld) | ||
75 | - ldap_unbind_ext(*ld, NULL, NULL); | ||
76 | - *ld = NULL; | ||
77 | -} | 75 | + size_t length; |
76 | + SSL_ERROR_MESSAGE * message; | ||
77 | + unsigned char contents[CRL_DATA_LENGTH]; | ||
78 | +} CURLDATA; | ||
78 | 79 | ||
79 | -static inline void lib3270_autoptr_cleanup_BerElement(BerElement **ber) | 80 | +static inline void lib3270_autoptr_cleanup_CURLDATA(CURLDATA **ptr) |
80 | { | 81 | { |
81 | - debug("%s(%p)",__FUNCTION__,*ber); | ||
82 | - if(*ber) | ||
83 | - ber_free(*ber, 0); | ||
84 | - *ber = NULL; | 82 | + debug("%s(%p)",__FUNCTION__,*ptr); |
83 | + if(*ptr) | ||
84 | + lib3270_free(*ptr); | ||
85 | + *ptr = NULL; | ||
85 | } | 86 | } |
86 | 87 | ||
87 | -static inline void lib3270_autoptr_cleanup_LDAPPTR(char **ptr) | 88 | +static inline void lib3270_autoptr_cleanup_BIO(BIO **ptr) |
88 | { | 89 | { |
89 | debug("%s(%p)",__FUNCTION__,*ptr); | 90 | debug("%s(%p)",__FUNCTION__,*ptr); |
90 | if(*ptr) | 91 | if(*ptr) |
91 | - ldap_memfree(*ptr); | 92 | + BIO_free_all(*ptr); |
92 | *ptr = NULL; | 93 | *ptr = NULL; |
93 | } | 94 | } |
94 | 95 | ||
95 | -#endif // HAVE_LDAP | ||
96 | - | ||
97 | -X509_CRL * lib3270_get_X509_CRL(H3270 *hSession, SSL_ERROR_MESSAGE * message) | 96 | +static size_t internal_curl_write_callback(void *contents, size_t size, size_t nmemb, void *userp) |
98 | { | 97 | { |
99 | - X509_CRL * crl = NULL; | 98 | + CURLDATA * data = (CURLDATA *) userp; |
99 | + | ||
100 | + size_t realsize = size * nmemb; | ||
100 | 101 | ||
101 | - if(!hSession->ssl.crl) | 102 | + if((size + data->length) > CRL_DATA_LENGTH) |
102 | { | 103 | { |
103 | -#ifdef LIB3270_DEFAULT_CRL | ||
104 | - hSession->ssl.crl = strdup(LIB3270_DEFAULT_CRL); | ||
105 | -#else | ||
106 | - char *env = getenv("LIB3270_DEFAULT_CRL"); | ||
107 | - if(env) | ||
108 | - hSession->ssl.crl = strdup(env); | ||
109 | -#endif // LIB3270_DEFAULT_CRL | 104 | + debug("CRL Data block is bigger than allocated block (%u bytes)",(unsigned int) size); |
105 | + return 0; | ||
110 | } | 106 | } |
111 | 107 | ||
112 | - if(!hSession->ssl.crl) | 108 | + debug("Received %u bytes", (unsigned int) realsize); |
109 | + | ||
110 | + memcpy(&(data->contents[data->length]),contents,realsize); | ||
111 | + data->length += realsize; | ||
112 | + | ||
113 | + return realsize; | ||
114 | +} | ||
115 | + | ||
116 | +#endif // HAVE_LIBCURL | ||
117 | + | ||
118 | + | ||
119 | +X509_CRL * lib3270_get_X509_CRL(H3270 *hSession, SSL_ERROR_MESSAGE * message) | ||
120 | +{ | ||
121 | + X509_CRL * crl = NULL; | ||
122 | + const char * consturl = lib3270_get_crl_url(hSession); | ||
123 | + | ||
124 | + if(!(consturl && *consturl)) | ||
113 | { | 125 | { |
126 | + message->error = hSession->ssl.error = 0; | ||
127 | + message->title = N_( "Security error" ); | ||
128 | + message->text = N_( "Can't open CRL File" ); | ||
129 | + message->description = N_("The URL for the CRL is undefined or empty"); | ||
114 | return NULL; | 130 | return NULL; |
115 | } | 131 | } |
116 | 132 | ||
117 | - trace_ssl(hSession, "crl=%s",hSession->ssl.crl); | 133 | + trace_ssl(hSession, "crl=%s",consturl); |
118 | 134 | ||
119 | - if(strncasecmp(hSession->ssl.crl,"file://",7) == 0) | 135 | + if(strncasecmp(consturl,"file://",7) == 0) |
120 | { | 136 | { |
121 | - lib3270_autoptr(FILE) hCRL = fopen(hSession->ssl.crl+7,"r"); | 137 | + lib3270_autoptr(FILE) hCRL = fopen(consturl+7,"r"); |
122 | 138 | ||
123 | if(!hCRL) | 139 | if(!hCRL) |
124 | { | 140 | { |
@@ -127,188 +143,133 @@ X509_CRL * lib3270_get_X509_CRL(H3270 *hSession, SSL_ERROR_MESSAGE * message) | @@ -127,188 +143,133 @@ X509_CRL * lib3270_get_X509_CRL(H3270 *hSession, SSL_ERROR_MESSAGE * message) | ||
127 | message->title = N_( "Security error" ); | 143 | message->title = N_( "Security error" ); |
128 | message->text = N_( "Can't open CRL File" ); | 144 | message->text = N_( "Can't open CRL File" ); |
129 | message->description = strerror(errno); | 145 | message->description = strerror(errno); |
130 | - lib3270_write_log(hSession,"ssl","Can't open %s: %s",hSession->ssl.crl,message->description); | 146 | + lib3270_write_log(hSession,"ssl","Can't open %s: %s",consturl,message->description); |
131 | return NULL; | 147 | return NULL; |
132 | 148 | ||
133 | } | 149 | } |
134 | 150 | ||
135 | - lib3270_write_log(hSession,"ssl","Loading CRL from %s",hSession->ssl.crl+7); | 151 | + lib3270_write_log(hSession,"ssl","Loading CRL from %s",consturl+7); |
136 | d2i_X509_CRL_fp(hCRL, &crl); | 152 | d2i_X509_CRL_fp(hCRL, &crl); |
137 | 153 | ||
138 | } | 154 | } |
139 | -#ifdef HAVE_LDAP | ||
140 | - else if(strncasecmp(hSession->ssl.crl,"ldap",4) == 0) | 155 | + else |
141 | { | 156 | { |
142 | - int rc; | ||
143 | - lib3270_autoptr(char) url = strdup(hSession->ssl.crl); | 157 | +#ifdef HAVE_LIBCURL |
144 | 158 | ||
145 | - char * attrs[] = { NULL, NULL }; | ||
146 | - char * base = NULL; | 159 | + // Use CURL to download the CRL |
160 | + lib3270_autoptr(CURLDATA) crl_data = lib3270_malloc(sizeof(CURLDATA)); | ||
161 | + lib3270_autoptr(CURL) hCurl = curl_easy_init(); | ||
147 | 162 | ||
148 | - const struct _args | ||
149 | - { | ||
150 | - const char * name; | ||
151 | - char ** value; | ||
152 | - } | ||
153 | - args[] = | ||
154 | - { | ||
155 | - { "attr", &attrs[0] }, | ||
156 | - { "base", &base } | ||
157 | - }; | ||
158 | - | ||
159 | - // Get arguments | ||
160 | - size_t arg; | ||
161 | - char * ptr = strchr(url,'?'); | ||
162 | - while(ptr) | 163 | + memset(crl_data,0,sizeof(CURLDATA)); |
164 | + crl_data->message = message; | ||
165 | + | ||
166 | + if(hCurl) | ||
163 | { | 167 | { |
164 | - *(ptr++) = 0; | ||
165 | - char *value = strchr(ptr,'='); | ||
166 | - if(!value) | ||
167 | - { | ||
168 | - message->error = hSession->ssl.error = 0; | ||
169 | - message->title = N_( "Security error" ); | ||
170 | - message->text = N_( "Invalid argument format" ); | ||
171 | - message->description = "The URL argument should be in the format name=value"; | ||
172 | - return NULL; | ||
173 | - } | 168 | + CURLcode res; |
169 | + | ||
170 | + curl_easy_setopt(hCurl, CURLOPT_URL, consturl); | ||
171 | + curl_easy_setopt(hCurl, CURLOPT_FOLLOWLOCATION, 1L); | ||
174 | 172 | ||
175 | - *(value++) = 0; | 173 | + curl_easy_setopt(hCurl, CURLOPT_WRITEFUNCTION, internal_curl_write_callback); |
174 | + curl_easy_setopt(hCurl, CURLOPT_WRITEDATA, (void *) crl_data); | ||
176 | 175 | ||
177 | - debug("%s=%s",ptr,value); | 176 | + res = curl_easy_perform(hCurl); |
178 | 177 | ||
179 | - for(arg = 0; arg < (sizeof(args)/sizeof(args[0])); arg++) | 178 | + if(res != CURLE_OK) |
180 | { | 179 | { |
181 | - if(!strcasecmp(ptr,args[arg].name)) | ||
182 | - { | ||
183 | - *args[arg].value = value; | ||
184 | - debug("%s=\"%s\"",args[arg].name,*args[arg].value); | ||
185 | - } | 180 | + message->error = hSession->ssl.error = 0; |
181 | + message->title = N_( "Security error" ); | ||
182 | + message->text = N_( "Error loading CRL" ); | ||
183 | + message->description = curl_easy_strerror(res); | ||
184 | + lib3270_write_log(hSession,"ssl","%s: %s",consturl, message->description); | ||
185 | + return NULL; | ||
186 | } | 186 | } |
187 | 187 | ||
188 | - ptr = strchr(value,'&'); | ||
189 | - } | ||
190 | - | ||
191 | - // Do we get all the required arguments? | ||
192 | - for(arg = 0; arg < (sizeof(args)/sizeof(args[0])); arg++) | ||
193 | - { | ||
194 | - if(!*args[arg].value) | 188 | + char *ct = NULL; |
189 | + res = curl_easy_getinfo(hCurl, CURLINFO_CONTENT_TYPE, &ct); | ||
190 | + if(res != CURLE_OK) | ||
195 | { | 191 | { |
196 | message->error = hSession->ssl.error = 0; | 192 | message->error = hSession->ssl.error = 0; |
197 | message->title = N_( "Security error" ); | 193 | message->title = N_( "Security error" ); |
198 | - message->text = N_( "Can't set LDAP query" ); | ||
199 | - message->description = N_("Insuficient arguments"); | ||
200 | - lib3270_write_log(hSession,"ssl","%s: Required argument \"%s\" is missing",url, args[arg].name); | 194 | + message->text = N_( "Error loading CRL" ); |
195 | + message->description = curl_easy_strerror(res); | ||
196 | + lib3270_write_log(hSession,"ssl","%s: %s",consturl, message->description); | ||
201 | return NULL; | 197 | return NULL; |
202 | } | 198 | } |
203 | - } | ||
204 | 199 | ||
205 | - // Do LDAP Query | ||
206 | - LDAP __attribute__ ((__cleanup__(lib3270_autoptr_cleanup_LDAP))) *ld = NULL; | ||
207 | - BerElement __attribute__ ((__cleanup__(lib3270_autoptr_cleanup_BerElement))) * ber = NULL; | 200 | + debug("content-type: %s",ct); |
208 | 201 | ||
209 | - rc = ldap_initialize(&ld, url); | ||
210 | - if(rc != LDAP_SUCCESS) | ||
211 | - { | ||
212 | - message->error = hSession->ssl.error = 0; | ||
213 | - message->title = N_( "Security error" ); | ||
214 | - message->text = N_( "Can't initialize LDAP" ); | ||
215 | - message->description = ldap_err2string(rc); | ||
216 | - lib3270_write_log(hSession,"ssl","%s: %s",url, message->description); | ||
217 | - return NULL; | ||
218 | - } | 202 | + if(ct) |
203 | + { | ||
204 | + const unsigned char * data = crl_data->contents; | ||
219 | 205 | ||
220 | - unsigned long version = LDAP_VERSION3; | ||
221 | - rc = ldap_set_option(ld, LDAP_OPT_PROTOCOL_VERSION,(void *) &version); | ||
222 | - if(rc != LDAP_SUCCESS) { | ||
223 | - message->error = hSession->ssl.error = 0; | ||
224 | - message->title = N_( "Security error" ); | ||
225 | - message->text = N_( "Can't set LDAP version" ); | ||
226 | - message->description = ldap_err2string(rc); | ||
227 | - lib3270_write_log(hSession,"ssl","%s: %s",url, message->description); | ||
228 | - return NULL; | ||
229 | - } | 206 | + if(strcasecmp(ct,"application/pkix-crl") == 0) |
207 | + { | ||
208 | + // CRL File, convert it | ||
209 | + if(!d2i_X509_CRL(&crl, &data, crl_data->length)) | ||
210 | + { | ||
211 | + message->error = hSession->ssl.error = ERR_get_error(); | ||
212 | + message->title = N_( "Security error" ); | ||
213 | + message->text = N_( "Got an invalid CRL from server" ); | ||
214 | + lib3270_write_log(hSession,"ssl","%s: %s",consturl, message->text); | ||
215 | + return NULL; | ||
216 | + } | ||
217 | + } | ||
218 | + else | ||
219 | + { | ||
220 | + message->error = hSession->ssl.error = ERR_get_error(); | ||
221 | + message->title = N_( "Security error" ); | ||
222 | + message->text = N_( "Got an invalid CRL from server" ); | ||
223 | + lib3270_write_log(hSession,"ssl","%s: content-type unexpected: \"%s\"",consturl, ct); | ||
224 | + return NULL; | ||
225 | + } | ||
226 | + } | ||
227 | + else if(strncasecmp(consturl,"ldap://",7) == 0) | ||
228 | + { | ||
229 | + // It's an LDAP query, assumes a base64 data. | ||
230 | + char * data = strstr((char *) crl_data->contents,":: "); | ||
231 | + if(!data) | ||
232 | + { | ||
233 | + message->error = hSession->ssl.error = ERR_get_error(); | ||
234 | + message->title = N_( "Security error" ); | ||
235 | + message->text = N_( "Got an invalid CRL from LDAP server" ); | ||
236 | + lib3270_write_log(hSession,"ssl","%s: invalid format:\n%s\n",consturl, crl_data->contents); | ||
237 | + return NULL; | ||
238 | + } | ||
239 | + data += 3; | ||
230 | 240 | ||
231 | - rc = ldap_simple_bind_s(ld, "", ""); | ||
232 | - if(rc != LDAP_SUCCESS) | ||
233 | - { | ||
234 | - message->error = hSession->ssl.error = 0; | ||
235 | - message->title = N_( "Security error" ); | ||
236 | - message->text = N_( "Can't bind to LDAP server" ); | ||
237 | - message->description = ldap_err2string(rc); | ||
238 | - lib3270_write_log(hSession,"ssl","%s: %s",url, message->description); | ||
239 | - return NULL; | ||
240 | - } | 241 | + debug("\n%s\nlength=%u",data,(unsigned int) strlen(data)); |
241 | 242 | ||
242 | - lib3270_autoptr(LDAPMessage) results = NULL; | ||
243 | - rc = ldap_search_ext_s( | ||
244 | - ld, // Specifies the LDAP pointer returned by a previous call to ldap_init(), ldap_ssl_init(), or ldap_open(). | ||
245 | - base, // Specifies the DN of the entry at which to start the search. | ||
246 | - LDAP_SCOPE_BASE, // Specifies the scope of the search. | ||
247 | - NULL, // Specifies a string representation of the filter to apply in the search. | ||
248 | - (char **) &attrs, // Specifies a null-terminated array of character string attribute types to return from entries that match filter. | ||
249 | - 0, // Should be set to 1 to request attribute types only. Set to 0 to request both attributes types and attribute values. | ||
250 | - NULL, | ||
251 | - NULL, | ||
252 | - NULL, | ||
253 | - 0, | ||
254 | - &results | ||
255 | - ); | ||
256 | - | ||
257 | - if(rc != LDAP_SUCCESS) | ||
258 | - { | ||
259 | - message->error = hSession->ssl.error = 0; | ||
260 | - message->title = N_( "Security error" ); | ||
261 | - message->text = N_( "Can't search LDAP server" ); | ||
262 | - message->description = ldap_err2string(rc); | ||
263 | - lib3270_write_log(hSession,"ssl","%s: %s",url, message->description); | ||
264 | - return NULL; | ||
265 | - } | 243 | + lib3270_autoptr(BIO) bio = BIO_new_mem_buf(data,-1); |
266 | 244 | ||
267 | - char __attribute__ ((__cleanup__(lib3270_autoptr_cleanup_LDAPPTR))) *attr = ldap_first_attribute(ld, results, &ber); | ||
268 | - if(!attr) | ||
269 | - { | ||
270 | - message->error = hSession->ssl.error = 0; | ||
271 | - message->title = N_( "Security error" ); | ||
272 | - message->text = N_( "Can't get LDAP attribute" ); | ||
273 | - message->description = N_("Search did not produce any attributes."); | ||
274 | - lib3270_write_log(hSession,"ssl","%s: %s",url, message->description); | ||
275 | - return NULL; | ||
276 | - } | 245 | + BIO * b64 = BIO_new(BIO_f_base64()); |
246 | + bio = BIO_push(b64, bio); | ||
277 | 247 | ||
278 | - struct berval ** value = ldap_get_values_len(ld, results, attr); | ||
279 | - if(!value) | ||
280 | - { | ||
281 | - message->error = hSession->ssl.error = 0; | ||
282 | - message->title = N_( "Security error" ); | ||
283 | - message->text = N_( "Can't get LDAP attribute" ); | ||
284 | - message->description = N_("Search did not produce any values."); | ||
285 | - lib3270_write_log(hSession,"ssl","%s: %s",url, message->description); | ||
286 | - return NULL; | ||
287 | - } | 248 | + BIO_set_flags(bio, BIO_FLAGS_BASE64_NO_NL); |
288 | 249 | ||
289 | - // Precisa salvar uma cópia porque d2i_X509_CRL modifica o ponteiro. | ||
290 | - const unsigned char *crl_data = (const unsigned char *) value[0]->bv_val; | 250 | + if(!d2i_X509_CRL_bio(bio, &crl)) |
251 | + { | ||
252 | + message->error = hSession->ssl.error = ERR_get_error(); | ||
253 | + message->title = N_( "Security error" ); | ||
254 | + message->text = N_( "Got an invalid CRL from server" ); | ||
255 | + lib3270_write_log(hSession,"ssl","%s: %s",consturl, message->text); | ||
256 | + return NULL; | ||
257 | + } | ||
291 | 258 | ||
292 | - if(!d2i_X509_CRL(&crl, &crl_data, value[0]->bv_len)) | ||
293 | - { | ||
294 | - message->error = hSession->ssl.error = ERR_get_error(); | ||
295 | - message->title = N_( "Security error" ); | ||
296 | - message->text = N_( "Can't get CRL from LDAP Search" ); | ||
297 | - lib3270_write_log(hSession,"ssl","%s: %s",url, message->text); | ||
298 | - } | 259 | + } |
299 | 260 | ||
300 | - ldap_value_free_len(value); | 261 | + } |
262 | +#else | ||
263 | + // Can't get CRL. | ||
301 | 264 | ||
302 | - } | ||
303 | -#endif // HAVE_LDAP | ||
304 | - else | ||
305 | - { | ||
306 | message->error = hSession->ssl.error = 0; | 265 | message->error = hSession->ssl.error = 0; |
307 | message->title = N_( "Security error" ); | 266 | message->title = N_( "Security error" ); |
308 | message->text = N_( "Unexpected or invalid CRL URL" ); | 267 | message->text = N_( "Unexpected or invalid CRL URL" ); |
309 | message->description = N_("The URL scheme is unknown"); | 268 | message->description = N_("The URL scheme is unknown"); |
310 | - lib3270_write_log(hSession,"ssl","%s: %s",hSession->ssl.crl, message->description); | 269 | + lib3270_write_log(hSession,"ssl","%s: %s",consturl, message->description); |
311 | return NULL; | 270 | return NULL; |
271 | +#endif // HAVE_LIBCURL | ||
272 | + | ||
312 | } | 273 | } |
313 | 274 | ||
314 | return crl; | 275 | return crl; |