mirror of
https://git.haproxy.org/git/haproxy.git/
synced 2025-08-08 08:07:10 +02:00
MINOR: ssl: use SSL_get_ciphers() instead of directly accessing the cipher list.
This commit is contained in:
parent
fad4ffc893
commit
23d5d378d0
@ -1478,9 +1478,8 @@ int ssl_sock_prepare_ctx(struct bind_conf *bind_conf, SSL_CTX *ctx, struct proxy
|
|||||||
SSL_MODE_ENABLE_PARTIAL_WRITE |
|
SSL_MODE_ENABLE_PARTIAL_WRITE |
|
||||||
SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER |
|
SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER |
|
||||||
SSL_MODE_RELEASE_BUFFERS;
|
SSL_MODE_RELEASE_BUFFERS;
|
||||||
#ifndef OPENSSL_IS_BORINGSSL
|
|
||||||
STACK_OF(SSL_CIPHER) * ciphers = NULL;
|
STACK_OF(SSL_CIPHER) * ciphers = NULL;
|
||||||
SSL_CIPHER * cipher = NULL;
|
SSL_CIPHER const * cipher = NULL;
|
||||||
char cipher_description[128];
|
char cipher_description[128];
|
||||||
/* The description of ciphers using an Ephemeral Diffie Hellman key exchange
|
/* The description of ciphers using an Ephemeral Diffie Hellman key exchange
|
||||||
contains " Kx=DH " or " Kx=DH(". Beware of " Kx=DH/",
|
contains " Kx=DH " or " Kx=DH(". Beware of " Kx=DH/",
|
||||||
@ -1489,10 +1488,7 @@ int ssl_sock_prepare_ctx(struct bind_conf *bind_conf, SSL_CTX *ctx, struct proxy
|
|||||||
const char dhe_export_description[] = " Kx=DH(";
|
const char dhe_export_description[] = " Kx=DH(";
|
||||||
int idx = 0;
|
int idx = 0;
|
||||||
int dhe_found = 0;
|
int dhe_found = 0;
|
||||||
#else /* OPENSSL_IS_BORINGSSL */
|
SSL *ssl = NULL;
|
||||||
/* assume dhe_found if boringssl is detected */
|
|
||||||
int dhe_found = 1;
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/* Make sure openssl opens /dev/urandom before the chroot */
|
/* Make sure openssl opens /dev/urandom before the chroot */
|
||||||
if (!ssl_initialize_random()) {
|
if (!ssl_initialize_random()) {
|
||||||
@ -1585,8 +1581,10 @@ int ssl_sock_prepare_ctx(struct bind_conf *bind_conf, SSL_CTX *ctx, struct proxy
|
|||||||
no static DH params were in the certificate file. */
|
no static DH params were in the certificate file. */
|
||||||
if (global.tune.ssl_default_dh_param == 0) {
|
if (global.tune.ssl_default_dh_param == 0) {
|
||||||
|
|
||||||
#ifndef OPENSSL_IS_BORINGSSL
|
ssl = SSL_new(ctx);
|
||||||
ciphers = ctx->cipher_list;
|
|
||||||
|
if (ssl) {
|
||||||
|
ciphers = SSL_get_ciphers(ssl);
|
||||||
|
|
||||||
if (ciphers) {
|
if (ciphers) {
|
||||||
for (idx = 0; idx < sk_SSL_CIPHER_num(ciphers); idx++) {
|
for (idx = 0; idx < sk_SSL_CIPHER_num(ciphers); idx++) {
|
||||||
@ -1600,7 +1598,9 @@ int ssl_sock_prepare_ctx(struct bind_conf *bind_conf, SSL_CTX *ctx, struct proxy
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
#endif /* OPENSSL_IS_BORINGSSL */
|
SSL_free(ssl);
|
||||||
|
ssl = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
if (dhe_found) {
|
if (dhe_found) {
|
||||||
Warning("Setting tune.ssl.default-dh-param to 1024 by default, if your workload permits it you should set it to at least 2048. Please set a value >= 1024 to make this warning disappear.\n");
|
Warning("Setting tune.ssl.default-dh-param to 1024 by default, if your workload permits it you should set it to at least 2048. Please set a value >= 1024 to make this warning disappear.\n");
|
||||||
|
Loading…
Reference in New Issue
Block a user