|
--- a/src/session.c
|
|
+++ b/src/session.c
|
|
@@ -1372,11 +1372,11 @@ tls_thread_id_func(CRYPTO_THREADID *tid)
|
|
static void
|
|
nc_tls_init(void)
|
|
{
|
|
+#if OPENSSL_VERSION_NUMBER < 0x10100000L // < 1.1.0
|
|
SSL_load_error_strings();
|
|
ERR_load_BIO_strings();
|
|
SSL_library_init();
|
|
|
|
-#if OPENSSL_VERSION_NUMBER < 0x10100000L // < 1.1.0
|
|
int i;
|
|
|
|
tls_locks = malloc(CRYPTO_num_locks() * sizeof *tls_locks);
|
|
@@ -1400,6 +1400,7 @@ nc_tls_init(void)
|
|
static void
|
|
nc_tls_destroy(void)
|
|
{
|
|
+#if OPENSSL_VERSION_NUMBER < 0x10100000L // < 1.1.0
|
|
FIPS_mode_set(0);
|
|
CRYPTO_cleanup_all_ex_data();
|
|
nc_thread_destroy();
|
|
@@ -1411,7 +1412,6 @@ nc_tls_destroy(void)
|
|
SSL_COMP_free_compression_methods();
|
|
#endif
|
|
|
|
-#if OPENSSL_VERSION_NUMBER < 0x10100000L // < 1.1.0
|
|
int i;
|
|
|
|
CRYPTO_THREADID_set_callback(NULL);
|
|
@@ -1434,13 +1434,13 @@ nc_tls_destroy(void)
|
|
static void
|
|
nc_ssh_tls_init(void)
|
|
{
|
|
+#if OPENSSL_VERSION_NUMBER < 0x10100000L // < 1.1.0
|
|
SSL_load_error_strings();
|
|
ERR_load_BIO_strings();
|
|
SSL_library_init();
|
|
|
|
nc_ssh_init();
|
|
|
|
-#if OPENSSL_VERSION_NUMBER < 0x10100000L // < 1.1.0
|
|
CRYPTO_set_dynlock_create_callback(tls_dyn_create_func);
|
|
CRYPTO_set_dynlock_lock_callback(tls_dyn_lock_func);
|
|
CRYPTO_set_dynlock_destroy_callback(tls_dyn_destroy_func);
|
|
@@ -1450,6 +1450,7 @@ nc_ssh_tls_init(void)
|
|
static void
|
|
nc_ssh_tls_destroy(void)
|
|
{
|
|
+#if OPENSSL_VERSION_NUMBER < 0x10100000L // < 1.1.0
|
|
ERR_free_strings();
|
|
#if OPENSSL_VERSION_NUMBER < 0x10002000L // < 1.0.2
|
|
sk_SSL_COMP_free(SSL_COMP_get_compression_methods());
|
|
@@ -1459,7 +1460,6 @@ nc_ssh_tls_destroy(void)
|
|
|
|
nc_ssh_destroy();
|
|
|
|
-#if OPENSSL_VERSION_NUMBER < 0x10100000L // < 1.1.0
|
|
CRYPTO_set_dynlock_create_callback(NULL);
|
|
CRYPTO_set_dynlock_lock_callback(NULL);
|
|
CRYPTO_set_dynlock_destroy_callback(NULL);
|
|
--- a/src/session_client_tls.c
|
|
+++ b/src/session_client_tls.c
|
|
@@ -29,6 +29,10 @@
|
|
#include "session_client_ch.h"
|
|
#include "libnetconf.h"
|
|
|
|
+#if OPENSSL_VERSION_NUMBER < 0x10100000L
|
|
+#define X509_STORE_CTX_get_by_subject X509_STORE_get_by_subject
|
|
+#endif
|
|
+
|
|
struct nc_client_context *nc_client_context_location(void);
|
|
int nc_session_new_ctx( struct nc_session *session, struct ly_ctx *ctx);
|
|
|
|
@@ -74,7 +78,7 @@ tlsauth_verify_callback(int preverify_ok, X509_STORE_CTX *x509_ctx)
|
|
store_ctx = X509_STORE_CTX_new();
|
|
obj = X509_OBJECT_new();
|
|
X509_STORE_CTX_init(store_ctx, opts->crl_store, NULL, NULL);
|
|
- rc = X509_STORE_get_by_subject(store_ctx, X509_LU_CRL, subject, obj);
|
|
+ rc = X509_STORE_CTX_get_by_subject(store_ctx, X509_LU_CRL, subject, obj);
|
|
X509_STORE_CTX_free(store_ctx);
|
|
crl = X509_OBJECT_get0_X509_CRL(obj);
|
|
if (rc > 0 && crl) {
|
|
@@ -113,7 +117,7 @@ tlsauth_verify_callback(int preverify_ok, X509_STORE_CTX *x509_ctx)
|
|
store_ctx = X509_STORE_CTX_new();
|
|
obj = X509_OBJECT_new();
|
|
X509_STORE_CTX_init(store_ctx, opts->crl_store, NULL, NULL);
|
|
- rc = X509_STORE_get_by_subject(store_ctx, X509_LU_CRL, issuer, obj);
|
|
+ rc = X509_STORE_CTX_get_by_subject(store_ctx, X509_LU_CRL, issuer, obj);
|
|
X509_STORE_CTX_free(store_ctx);
|
|
crl = X509_OBJECT_get0_X509_CRL(obj);
|
|
if (rc > 0 && crl) {
|
|
@@ -169,7 +173,7 @@ tlsauth_verify_callback(int preverify_ok, X509_STORE_CTX *x509_ctx)
|
|
* the current certificate in order to verify it's integrity */
|
|
memset((char *)&obj, 0, sizeof obj);
|
|
X509_STORE_CTX_init(&store_ctx, opts->crl_store, NULL, NULL);
|
|
- rc = X509_STORE_get_by_subject(&store_ctx, X509_LU_CRL, subject, &obj);
|
|
+ rc = X509_STORE_CTX_get_by_subject(&store_ctx, X509_LU_CRL, subject, &obj);
|
|
X509_STORE_CTX_cleanup(&store_ctx);
|
|
crl = obj.data.crl;
|
|
if (rc > 0 && crl) {
|
|
@@ -207,7 +211,7 @@ tlsauth_verify_callback(int preverify_ok, X509_STORE_CTX *x509_ctx)
|
|
* the current certificate in order to check for revocation */
|
|
memset((char *)&obj, 0, sizeof obj);
|
|
X509_STORE_CTX_init(&store_ctx, opts->crl_store, NULL, NULL);
|
|
- rc = X509_STORE_get_by_subject(&store_ctx, X509_LU_CRL, issuer, &obj);
|
|
+ rc = X509_STORE_CTX_get_by_subject(&store_ctx, X509_LU_CRL, issuer, &obj);
|
|
X509_STORE_CTX_cleanup(&store_ctx);
|
|
crl = obj.data.crl;
|
|
if (rc > 0 && crl) {
|
|
--- a/src/session_server_tls.c
|
|
+++ b/src/session_server_tls.c
|
|
@@ -28,6 +28,10 @@
|
|
#include "session_server_ch.h"
|
|
#include "libnetconf.h"
|
|
|
|
+#if OPENSSL_VERSION_NUMBER < 0x10100000L
|
|
+#define X509_STORE_CTX_get_by_subject X509_STORE_get_by_subject
|
|
+#endif
|
|
+
|
|
struct nc_server_tls_opts tls_ch_opts;
|
|
pthread_mutex_t tls_ch_opts_lock = PTHREAD_MUTEX_INITIALIZER;
|
|
extern struct nc_server_opts server_opts;
|
|
@@ -563,7 +567,7 @@ nc_tlsclb_verify(int preverify_ok, X509_STORE_CTX *x509_ctx)
|
|
store_ctx = X509_STORE_CTX_new();
|
|
obj = X509_OBJECT_new();
|
|
X509_STORE_CTX_init(store_ctx, opts->crl_store, NULL, NULL);
|
|
- rc = X509_STORE_get_by_subject(store_ctx, X509_LU_CRL, subject, obj);
|
|
+ rc = X509_STORE_CTX_get_by_subject(store_ctx, X509_LU_CRL, subject, obj);
|
|
X509_STORE_CTX_free(store_ctx);
|
|
crl = X509_OBJECT_get0_X509_CRL(obj);
|
|
if (rc > 0 && crl) {
|
|
@@ -616,7 +620,7 @@ nc_tlsclb_verify(int preverify_ok, X509_STORE_CTX *x509_ctx)
|
|
store_ctx = X509_STORE_CTX_new();
|
|
obj = X509_OBJECT_new();
|
|
X509_STORE_CTX_init(store_ctx, opts->crl_store, NULL, NULL);
|
|
- rc = X509_STORE_get_by_subject(store_ctx, X509_LU_CRL, issuer, obj);
|
|
+ rc = X509_STORE_CTX_get_by_subject(store_ctx, X509_LU_CRL, issuer, obj);
|
|
X509_STORE_CTX_free(store_ctx);
|
|
crl = X509_OBJECT_get0_X509_CRL(obj);
|
|
if (rc > 0 && crl) {
|
|
@@ -776,7 +780,7 @@ nc_tlsclb_verify(int preverify_ok, X509_STORE_CTX *x509_ctx)
|
|
* the current certificate in order to verify it's integrity */
|
|
memset((char *)&obj, 0, sizeof(obj));
|
|
X509_STORE_CTX_init(&store_ctx, opts->crl_store, NULL, NULL);
|
|
- rc = X509_STORE_get_by_subject(&store_ctx, X509_LU_CRL, subject, &obj);
|
|
+ rc = X509_STORE_CTX_get_by_subject(&store_ctx, X509_LU_CRL, subject, &obj);
|
|
X509_STORE_CTX_cleanup(&store_ctx);
|
|
crl = obj.data.crl;
|
|
if (rc > 0 && crl) {
|
|
@@ -828,7 +832,7 @@ nc_tlsclb_verify(int preverify_ok, X509_STORE_CTX *x509_ctx)
|
|
* the current certificate in order to check for revocation */
|
|
memset((char *)&obj, 0, sizeof(obj));
|
|
X509_STORE_CTX_init(&store_ctx, opts->crl_store, NULL, NULL);
|
|
- rc = X509_STORE_get_by_subject(&store_ctx, X509_LU_CRL, issuer, &obj);
|
|
+ rc = X509_STORE_CTX_get_by_subject(&store_ctx, X509_LU_CRL, issuer, &obj);
|
|
X509_STORE_CTX_cleanup(&store_ctx);
|
|
crl = obj.data.crl;
|
|
if (rc > 0 && crl) {
|