Compare commits
5 commits
b9dc169917
...
bd310e62ac
Author | SHA1 | Date | |
---|---|---|---|
bd310e62ac | |||
|
d7faff734c | ||
|
5dc1ec49eb | ||
|
eca717d90c | ||
b6388eb7fe |
1 changed files with 2 additions and 8 deletions
|
@ -71,14 +71,6 @@ TlsInitClient(int fd, const char *serverName)
|
||||||
OpenSSLCookie *cookie;
|
OpenSSLCookie *cookie;
|
||||||
char errorStr[256];
|
char errorStr[256];
|
||||||
|
|
||||||
/*
|
|
||||||
* TODO: Seems odd that this isn't needed to make the
|
|
||||||
* connection... we should figure out how to verify the
|
|
||||||
* certificate matches the server we think we're
|
|
||||||
* connecting to.
|
|
||||||
*/
|
|
||||||
(void) serverName;
|
|
||||||
|
|
||||||
cookie = Malloc(sizeof(OpenSSLCookie));
|
cookie = Malloc(sizeof(OpenSSLCookie));
|
||||||
if (!cookie)
|
if (!cookie)
|
||||||
{
|
{
|
||||||
|
@ -89,12 +81,14 @@ TlsInitClient(int fd, const char *serverName)
|
||||||
|
|
||||||
cookie->method = TLS_client_method();
|
cookie->method = TLS_client_method();
|
||||||
cookie->ctx = SSL_CTX_new(cookie->method);
|
cookie->ctx = SSL_CTX_new(cookie->method);
|
||||||
|
coolie->fd = fd;
|
||||||
if (!cookie->ctx)
|
if (!cookie->ctx)
|
||||||
{
|
{
|
||||||
goto error;
|
goto error;
|
||||||
}
|
}
|
||||||
|
|
||||||
cookie->ssl = SSL_new(cookie->ctx);
|
cookie->ssl = SSL_new(cookie->ctx);
|
||||||
|
SSL_set_tlsext_host_name(cookie->ssl, serverName);
|
||||||
if (!cookie->ssl)
|
if (!cookie->ssl)
|
||||||
{
|
{
|
||||||
goto error;
|
goto error;
|
||||||
|
|
Loading…
Reference in a new issue