mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-24 04:13:28 +01:00
r15997@catbus: nickm | 2007-10-21 20:25:40 -0400
New code (disabled for now) to use the SSL context's cert store instead of using its "extra chain cert" list to get our identity certificate sent. This is a little close to what OpenSSL expects people to do, and it has the advantage that we should be able to keep the id cert from being sent by setting the NO_CHAIN_CERT bit. I have tried turning new code on, and it seemed to work fine. svn:r12086
This commit is contained in:
parent
bacbf984ca
commit
722c7bdff4
2
doc/TODO
2
doc/TODO
@ -54,7 +54,7 @@ Things we'd like to do in 0.2.0.x:
|
||||
downloading the certs to check
|
||||
- But don't delay forever.
|
||||
o Make new download types comply with should_delay_dir_fetches()
|
||||
- When DownloadExtraInfo is turned on for the first time, don't flip
|
||||
o When DownloadExtraInfo is turned on for the first time, don't flip
|
||||
out and download the ancient history of the universe.
|
||||
o List IP addresses in certificates?
|
||||
o Make the address in votes be an actual IP address.
|
||||
|
@ -399,8 +399,16 @@ tor_tls_context_new(crypto_pk_env_t *identity, const char *nickname,
|
||||
goto error;
|
||||
X509_free(cert); /* We just added a reference to cert. */
|
||||
cert=NULL;
|
||||
#if 1
|
||||
if (idcert && !SSL_CTX_add_extra_chain_cert(result->ctx,idcert))
|
||||
goto error;
|
||||
#else
|
||||
if (idcert) {
|
||||
X509_STORE *s = SSL_CTX_get_cert_store(result->ctx);
|
||||
tor_assert(s);
|
||||
X509_STORE_add_cert(s, idcert);
|
||||
}
|
||||
#endif
|
||||
idcert=NULL; /* The context now owns the reference to idcert */
|
||||
SSL_CTX_set_session_cache_mode(result->ctx, SSL_SESS_CACHE_OFF);
|
||||
tor_assert(rsa);
|
||||
|
Loading…
Reference in New Issue
Block a user