mirror of
https://github.com/zeek/zeek.git
synced 2025-10-02 06:38:20 +00:00
Merge remote branch 'origin/fastpath'
This commit is contained in:
commit
c690a8b2f3
4 changed files with 12 additions and 7 deletions
5
CHANGES
5
CHANGES
|
@ -2,6 +2,11 @@
|
|||
|
||||
-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
||||
|
||||
1.6-dev.2 Wed Dec 8 03:57:03 PST 2010
|
||||
|
||||
- Compatibility fix for OpenSSL 1.0.0 (Christian Kreibich, Gregor
|
||||
Maier).
|
||||
|
||||
1.6-dev.1 Sat Nov 27 12:19:47 PST 2010
|
||||
|
||||
- Merge with Subversion repository as of r7098. Incorporated changes:
|
||||
|
|
2
VERSION
2
VERSION
|
@ -1 +1 @@
|
|||
1.6-dev.1
|
||||
1.6-dev.2
|
||||
|
|
|
@ -192,7 +192,7 @@ int X509_Cert::verifyChain(Contents_SSL* e, const u_char* data, uint32 len)
|
|||
// but in chain format).
|
||||
|
||||
// Init the stack.
|
||||
STACK_OF(X509)* untrustedCerts = sk_new_null();
|
||||
STACK_OF(X509)* untrustedCerts = sk_X509_new_null();
|
||||
if ( ! untrustedCerts )
|
||||
{
|
||||
// Internal error allocating stack of untrusted certs.
|
||||
|
@ -233,7 +233,7 @@ int X509_Cert::verifyChain(Contents_SSL* e, const u_char* data, uint32 len)
|
|||
else
|
||||
// The remaining certificates (if any) are put into
|
||||
// the list of untrusted certificates
|
||||
sk_push(untrustedCerts, (char*) pTemp);
|
||||
sk_X509_push(untrustedCerts, pTemp);
|
||||
|
||||
tempLength += certLength + 3;
|
||||
}
|
||||
|
@ -259,7 +259,7 @@ int X509_Cert::verifyChain(Contents_SSL* e, const u_char* data, uint32 len)
|
|||
// Free the stack, incuding. contents.
|
||||
|
||||
// FIXME: could this break Bro's memory tracking?
|
||||
sk_pop_free(untrustedCerts, free);
|
||||
sk_X509_pop_free(untrustedCerts, X509_free);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
|
|
@ -370,7 +370,7 @@ refine analyzer SSLAnalyzer += {
|
|||
STACK_OF(X509)* untrusted_certs = 0;
|
||||
if ( certificates->size() > 1 )
|
||||
{
|
||||
untrusted_certs = sk_new_null();
|
||||
untrusted_certs = sk_X509_new_null();
|
||||
if ( ! untrusted_certs )
|
||||
{
|
||||
// X509_V_ERR_OUT_OF_MEM;
|
||||
|
@ -393,7 +393,7 @@ refine analyzer SSLAnalyzer += {
|
|||
return false;
|
||||
}
|
||||
|
||||
sk_push(untrusted_certs, (char*) pTemp);
|
||||
sk_X509_push(untrusted_certs, pTemp);
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -405,7 +405,7 @@ refine analyzer SSLAnalyzer += {
|
|||
certificate_error(csc.error);
|
||||
X509_STORE_CTX_cleanup(&csc);
|
||||
|
||||
sk_pop_free(untrusted_certs, free_X509);
|
||||
sk_X509_pop_free(untrusted_certs, X509_free);
|
||||
}
|
||||
|
||||
X509_free(pCert);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue