]> git.sur5r.net Git - openldap/commitdiff
In session_chkhost get the last CN, not the first.
authorHoward Chu <hyc@openldap.org>
Fri, 7 Aug 2009 11:59:42 +0000 (11:59 +0000)
committerHoward Chu <hyc@openldap.org>
Fri, 7 Aug 2009 11:59:42 +0000 (11:59 +0000)
libraries/libldap/tls_g.c
libraries/libldap/tls_o.c

index e3c82bbc6f6f68fe1c2e9d3d884e1b8553b408e4..9313bfbf7cf37aff63d2bdd4300f4037878b7ead 100644 (file)
@@ -722,9 +722,24 @@ tlsg_session_chkhost( LDAP *ld, tls_session *session, const char *name_in )
        if ( ret >= 0 ) {
                ret = LDAP_SUCCESS;
        } else {
-               altnamesize = sizeof(altname);
-               ret = gnutls_x509_crt_get_dn_by_oid( cert, CN_OID,
-                       0, 0, altname, &altnamesize );
+               /* find the last CN */
+               i=0;
+               do {
+                       altnamesize = 0;
+                       ret = gnutls_x509_crt_get_dn_by_oid( cert, CN_OID,
+                               i, 1, altname, &altnamesize );
+                       if ( ret == GNUTLS_E_SHORT_MEMORY_BUFFER )
+                               i++;
+                       else
+                               break;
+               } while ( 1 );
+
+               if ( i ) {
+                       altnamesize = sizeof(altname);
+                       ret = gnutls_x509_crt_get_dn_by_oid( cert, CN_OID,
+                               i-1, 0, altname, &altnamesize );
+               }
+
                if ( ret < 0 ) {
                        Debug( LDAP_DEBUG_ANY,
                                "TLS: unable to get common name from peer certificate.\n",
index 5b5bfb94a9c16921a05ad14587cabeadaac93633..0c0645fede89dc593def0d383b99557225c9f8f6 100644 (file)
@@ -579,15 +579,28 @@ tlso_session_chkhost( LDAP *ld, tls_session *sess, const char *name_in )
 
        if (ret != LDAP_SUCCESS) {
                X509_NAME *xn;
-               char buf[2048];
-               int clen;
-               buf[0] = '\0';
+               X509_NAME_ENTRY *ne;
+               ASN1_OBJECT *obj;
+               ASN1_STRING *cn = NULL;
+               int navas;
+
+               /* find the last CN */
+               obj = OBJ_nid2obj( NID_commonName );
+               if ( !obj ) goto no_cn; /* should never happen */
 
                xn = X509_get_subject_name(x);
-               clen = X509_NAME_get_text_by_NID( xn, NID_commonName,
-                       buf, sizeof(buf));
-               if( clen == -1 )
+               navas = X509_NAME_entry_count( xn );
+               for ( i=navas-1; i>=0; i-- ) {
+                       ne = X509_NAME_get_entry( xn, i );
+                       if ( !OBJ_cmp( ne->object, obj )) {
+                               cn = X509_NAME_ENTRY_get_data( ne );
+                               break;
+                       }
+               }
+
+               if( !cn )
                {
+no_cn:
                        Debug( LDAP_DEBUG_ANY,
                                "TLS: unable to get common name from peer certificate.\n",
                                0, 0, 0 );
@@ -598,10 +611,11 @@ tlso_session_chkhost( LDAP *ld, tls_session *sess, const char *name_in )
                        ld->ld_error = LDAP_STRDUP(
                                _("TLS: unable to get CN from peer certificate"));
 
-               } else if (clen == nlen && strcasecmp(name, buf) == 0 ) {
+               } else if ( cn->length == nlen &&
+                       strncasecmp( name, cn->data, nlen ) == 0 ) {
                        ret = LDAP_SUCCESS;
 
-               } else if (( buf[0] == '*' ) && ( buf[1] == '.' )) {
+               } else if (( cn->data[0] == '*' ) && ( cn->data[1] == '.' )) {
                        char *domain = strchr(name, '.');
                        if( domain ) {
                                size_t dlen;
@@ -609,7 +623,8 @@ tlso_session_chkhost( LDAP *ld, tls_session *sess, const char *name_in )
                                dlen = nlen - (domain-name);
 
                                /* Is this a wildcard match? */
-                               if ((dlen == clen-1) && !strncasecmp(domain, &buf[1], dlen)) {
+                               if ((dlen == cn->length-1) &&
+                                       !strncasecmp(domain, &cn->data[1], dlen)) {
                                        ret = LDAP_SUCCESS;
                                }
                        }
@@ -617,8 +632,8 @@ tlso_session_chkhost( LDAP *ld, tls_session *sess, const char *name_in )
 
                if( ret == LDAP_LOCAL_ERROR ) {
                        Debug( LDAP_DEBUG_ANY, "TLS: hostname (%s) does not match "
-                               "common name in certificate (%s).\n", 
-                               name, buf, 0 );
+                               "common name in certificate (%.*s).\n", 
+                               name, cn->length, cn->data );
                        ret = LDAP_CONNECT_ERROR;
                        if ( ld->ld_error ) {
                                LDAP_FREE( ld->ld_error );