mirror of
https://github.com/ZoiteChat/zoitechat.git
synced 2026-03-14 09:40:20 +00:00
win32: Update to OpenSSL 1.1
This commit is contained in:
@@ -772,7 +772,7 @@ server_connect_success (server *serv)
|
||||
|
||||
/* it'll be a memory leak, if connection isn't terminated by
|
||||
server_cleanup() */
|
||||
if ((err = _SSL_set_verify (serv->ctx, ssl_cb_verify, NULL)))
|
||||
if ((err = _SSL_set_verify (serv->ctx, ssl_cb_verify)))
|
||||
{
|
||||
EMIT_SIGNAL (XP_TE_CONNFAIL, serv->server_session, err, NULL,
|
||||
NULL, NULL, 0);
|
||||
|
||||
@@ -321,23 +321,22 @@ _SSL_socket (SSL_CTX *ctx, int sd)
|
||||
|
||||
|
||||
char *
|
||||
_SSL_set_verify (SSL_CTX *ctx, void *verify_callback, char *cacert)
|
||||
_SSL_set_verify (SSL_CTX *ctx, void *verify_callback)
|
||||
{
|
||||
#ifdef DEFAULT_CERT_FILE
|
||||
if (!SSL_CTX_load_verify_locations (ctx, DEFAULT_CERT_FILE, NULL))
|
||||
{
|
||||
__SSL_fill_err_buf ("SSL_CTX_load_verify_locations");
|
||||
return (err_buf);
|
||||
}
|
||||
#else
|
||||
if (!SSL_CTX_set_default_verify_paths (ctx))
|
||||
{
|
||||
__SSL_fill_err_buf ("SSL_CTX_set_default_verify_paths");
|
||||
return (err_buf);
|
||||
}
|
||||
/*
|
||||
if (cacert)
|
||||
{
|
||||
if (!SSL_CTX_load_verify_locations (ctx, cacert, NULL))
|
||||
{
|
||||
__SSL_fill_err_buf ("SSL_CTX_load_verify_locations");
|
||||
return (err_buf);
|
||||
}
|
||||
}
|
||||
*/
|
||||
#endif
|
||||
|
||||
SSL_CTX_set_verify (ctx, SSL_VERIFY_PEER, verify_callback);
|
||||
|
||||
return (NULL);
|
||||
|
||||
@@ -45,7 +45,7 @@ SSL_CTX *_SSL_context_init (void (*info_cb_func));
|
||||
#define _SSL_context_free(a) SSL_CTX_free(a);
|
||||
|
||||
SSL *_SSL_socket (SSL_CTX *ctx, int sd);
|
||||
char *_SSL_set_verify (SSL_CTX *ctx, void *(verify_callback), char *cacert);
|
||||
char *_SSL_set_verify (SSL_CTX *ctx, void *(verify_callback));
|
||||
/*
|
||||
int SSL_connect(SSL *);
|
||||
int SSL_accept(SSL *);
|
||||
|
||||
Reference in New Issue
Block a user