Known critical extension check is done by caNl (better than in gridsite).
authorMarcel Poul <marcel.poul@cern.ch>
Thu, 13 Sep 2012 11:50:25 +0000 (11:50 +0000)
committerMarcel Poul <marcel.poul@cern.ch>
Thu, 13 Sep 2012 11:50:25 +0000 (11:50 +0000)
Have to look for RSTx509KnownCriticalExts() call. It might not be needed in future.

org.gridsite.core/src/canl_mod_gridsite.c
org.gridsite.core/src/grst_canl_x509.c

index 1d265d3..2fccc38 100644 (file)
@@ -3492,29 +3492,6 @@ int GRST_callback_SSLVerify_wrapper(int ok, X509_STORE_CTX *ctx)
         X509_STORE_CTX_set_error(ctx, errnum);
      }
 
-   /*
-    * New style GSI Proxy handling, with critical ProxyCertInfo
-    * extension: we use GRSTx509KnownCriticalExts() to check this
-    */
-#ifndef X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION
-#define X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION 34
-#endif
-   if (errnum == X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION)
-     {
-       if (GRSTx509KnownCriticalExts(X509_STORE_CTX_get_current_cert(ctx))
-                                                              == GRST_RET_OK)
-         {
-            ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, s,
-                     "GRSTx509KnownCriticalExts() accepts previously "
-                     "Unhandled Critical Extension (GSI Proxy?)");
-
-            sslconn->verify_error = NULL;
-            ok = TRUE;
-            errnum = X509_V_OK;
-            X509_STORE_CTX_set_error(ctx, errnum);
-         }
-     }
-
 #if AP_MODULE_MAGIC_AT_LEAST(20051115,0)
    returned_ok = ok;
 #else
index a1219c8..c5028ef 100644 (file)
@@ -120,6 +120,7 @@ int GRSTx509NameCmp(char *a, char *b)
 
 
 /// Check critical extensions
+/*TODO MBD*/
 int GRSTx509KnownCriticalExts(X509 *cert)
 ///
 /// Returning GRST_RET_OK if all of extensions are known to us or