diff options
author | Jeffrey Stedfast <fejj@src.gnome.org> | 2002-01-03 05:32:31 +0800 |
---|---|---|
committer | Jeffrey Stedfast <fejj@src.gnome.org> | 2002-01-03 05:32:31 +0800 |
commit | 482507aff7b24e7b8aabf57f7b4ef0389f08515f (patch) | |
tree | 13d6c497822fa4d3f130ecaa91f3d980d6ab2983 | |
parent | b0a8f5c028d48520c5533644f77aa2ff6dcdec35 (diff) | |
download | gsoc2013-evolution-482507aff7b24e7b8aabf57f7b4ef0389f08515f.tar gsoc2013-evolution-482507aff7b24e7b8aabf57f7b4ef0389f08515f.tar.gz gsoc2013-evolution-482507aff7b24e7b8aabf57f7b4ef0389f08515f.tar.bz2 gsoc2013-evolution-482507aff7b24e7b8aabf57f7b4ef0389f08515f.tar.lz gsoc2013-evolution-482507aff7b24e7b8aabf57f7b4ef0389f08515f.tar.xz gsoc2013-evolution-482507aff7b24e7b8aabf57f7b4ef0389f08515f.tar.zst gsoc2013-evolution-482507aff7b24e7b8aabf57f7b4ef0389f08515f.zip |
so my guess is that mutt probably doesn't compile since we don't compile using the functions that mutt uses.
this is why I love libnss.
svn path=/trunk/; revision=15229
-rw-r--r-- | camel/camel-tcp-stream-ssl.c | 16 |
1 files changed, 10 insertions, 6 deletions
diff --git a/camel/camel-tcp-stream-ssl.c b/camel/camel-tcp-stream-ssl.c index 50e6aed152..b63586ac9c 100644 --- a/camel/camel-tcp-stream-ssl.c +++ b/camel/camel-tcp-stream-ssl.c @@ -41,7 +41,10 @@ #include <cert.h> #include <certdb.h> #include <pk11func.h> -#include <sechash.h> + +/* this is commented because otherwise we get an error about the + redefinition of MD5Context...yay */ +/*#include <e-util/md5-utils.h>*/ #include "camel-tcp-stream-ssl.h" #include "camel-session.h" @@ -403,10 +406,10 @@ static SECStatus ssl_bad_cert (void *data, PRFileDesc *sockfd) { unsigned char md5sum[16], fingerprint[40], *f; - CERTCertificate *cert, *issuer; gboolean accept, valid_cert; char *prompt, *cert_str; CamelTcpStreamSSL *ssl; + CERTCertificate *cert; CamelService *service; int i; @@ -423,13 +426,14 @@ ssl_bad_cert (void *data, PRFileDesc *sockfd) cert = SSL_PeerCertificate (sockfd); /* calculate the MD5 hash of the raw certificate */ - /*md5_get_digest (cert->derCert.data, cert->derCert.len, md5sum);*/ - HASH_HashBuf (HASH_AlgMD5, md5sum, cert->derCert.data, cert->derCert.len); + md5_get_digest (cert->derCert.data, cert->derCert.len, md5sum); + /*HASH_HashBuf (HASH_AlgMD5, md5sum, cert->derCert.data, cert->derCert.len);*/ for (i = 0, f = fingerprint; i < 16; i++, f += 3) sprintf (f, "%.2x%c", md5sum[i], i != 15 ? ':' : '\0'); - issuer = CERT_FindCertByName (CERT_GetDefaultCertDB (), &cert->derIssuer); - valid_cert = issuer && CERT_VerifySignedData (&cert->signatureWrap, issuer, PR_Now (), NULL); + valid_cert = CERT_VerifyCertNow (CERT_GetDefaultCertDB (), cert, TRUE, certUsageSSLClient, NULL); + /*issuer = CERT_FindCertByName (CERT_GetDefaultCertDB (), &cert->derIssuer); + valid_cert = issuer && CERT_VerifySignedData (&cert->signatureWrap, issuer, PR_Now (), NULL);*/ cert_str = g_strdup_printf (_("Issuer: %s\n" "Subject: %s\n" |