forked from rpms/openssl
aabbc9ad89
- fix CVE-2009-3555 - note that the fix is bypassed if SSL_OP_ALL is used so the compatibility with unfixed clients is not broken. The protocol extension is also not final.
78 lines
2.6 KiB
Diff
78 lines
2.6 KiB
Diff
diff -up openssl-1.0.0-beta4/apps/s_client.c.default-paths openssl-1.0.0-beta4/apps/s_client.c
|
|
--- openssl-1.0.0-beta4/apps/s_client.c.default-paths 2009-08-12 15:21:26.000000000 +0200
|
|
+++ openssl-1.0.0-beta4/apps/s_client.c 2009-11-12 12:26:32.000000000 +0100
|
|
@@ -889,12 +889,13 @@ bad:
|
|
if (!set_cert_key_stuff(ctx,cert,key))
|
|
goto end;
|
|
|
|
- if ((!SSL_CTX_load_verify_locations(ctx,CAfile,CApath)) ||
|
|
- (!SSL_CTX_set_default_verify_paths(ctx)))
|
|
+ if (!SSL_CTX_load_verify_locations(ctx,CAfile,CApath))
|
|
+ {
|
|
+ ERR_print_errors(bio_err);
|
|
+ }
|
|
+ if (!SSL_CTX_set_default_verify_paths(ctx))
|
|
{
|
|
- /* BIO_printf(bio_err,"error setting default verify locations\n"); */
|
|
ERR_print_errors(bio_err);
|
|
- /* goto end; */
|
|
}
|
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
diff -up openssl-1.0.0-beta4/apps/s_server.c.default-paths openssl-1.0.0-beta4/apps/s_server.c
|
|
--- openssl-1.0.0-beta4/apps/s_server.c.default-paths 2009-10-28 18:49:37.000000000 +0100
|
|
+++ openssl-1.0.0-beta4/apps/s_server.c 2009-11-12 12:31:23.000000000 +0100
|
|
@@ -1408,12 +1408,13 @@ bad:
|
|
}
|
|
#endif
|
|
|
|
- if ((!SSL_CTX_load_verify_locations(ctx,CAfile,CApath)) ||
|
|
- (!SSL_CTX_set_default_verify_paths(ctx)))
|
|
+ if (!SSL_CTX_load_verify_locations(ctx,CAfile,CApath))
|
|
+ {
|
|
+ ERR_print_errors(bio_err);
|
|
+ }
|
|
+ if (!SSL_CTX_set_default_verify_paths(ctx))
|
|
{
|
|
- /* BIO_printf(bio_err,"X509_load_verify_locations\n"); */
|
|
ERR_print_errors(bio_err);
|
|
- /* goto end; */
|
|
}
|
|
if (vpm)
|
|
SSL_CTX_set1_param(ctx, vpm);
|
|
@@ -1465,8 +1466,11 @@ bad:
|
|
else
|
|
SSL_CTX_sess_set_cache_size(ctx2,128);
|
|
|
|
- if ((!SSL_CTX_load_verify_locations(ctx2,CAfile,CApath)) ||
|
|
- (!SSL_CTX_set_default_verify_paths(ctx2)))
|
|
+ if (!SSL_CTX_load_verify_locations(ctx2,CAfile,CApath))
|
|
+ {
|
|
+ ERR_print_errors(bio_err);
|
|
+ }
|
|
+ if (!SSL_CTX_set_default_verify_paths(ctx2))
|
|
{
|
|
ERR_print_errors(bio_err);
|
|
}
|
|
diff -up openssl-1.0.0-beta4/apps/s_time.c.default-paths openssl-1.0.0-beta4/apps/s_time.c
|
|
--- openssl-1.0.0-beta4/apps/s_time.c.default-paths 2006-04-17 14:22:13.000000000 +0200
|
|
+++ openssl-1.0.0-beta4/apps/s_time.c 2009-11-12 12:26:32.000000000 +0100
|
|
@@ -373,12 +373,13 @@ int MAIN(int argc, char **argv)
|
|
|
|
SSL_load_error_strings();
|
|
|
|
- if ((!SSL_CTX_load_verify_locations(tm_ctx,CAfile,CApath)) ||
|
|
- (!SSL_CTX_set_default_verify_paths(tm_ctx)))
|
|
+ if (!SSL_CTX_load_verify_locations(tm_ctx,CAfile,CApath))
|
|
+ {
|
|
+ ERR_print_errors(bio_err);
|
|
+ }
|
|
+ if (!SSL_CTX_set_default_verify_paths(tm_ctx))
|
|
{
|
|
- /* BIO_printf(bio_err,"error setting default verify locations\n"); */
|
|
ERR_print_errors(bio_err);
|
|
- /* goto end; */
|
|
}
|
|
|
|
if (tm_cipher == NULL)
|