diff options
| author | Wilson E. Alvarez | 2017-08-21 15:15:36 -0400 |
|---|---|---|
| committer | Wilson E. Alvarez | 2017-08-21 15:15:55 -0400 |
| commit | 738d2ab96997faa1e13b91e38cf8a0000d829f70 (patch) | |
| tree | e33258663017edb924695e68224ba836e5fc9f08 /modules/openssl/stream_peer_openssl.cpp | |
| parent | 4717d37bfa867d8cdcd4805967324978da6701b7 (diff) | |
| download | godot-738d2ab96997faa1e13b91e38cf8a0000d829f70.tar.gz godot-738d2ab96997faa1e13b91e38cf8a0000d829f70.tar.zst godot-738d2ab96997faa1e13b91e38cf8a0000d829f70.zip | |
Diffstat (limited to 'modules/openssl/stream_peer_openssl.cpp')
| -rw-r--r-- | modules/openssl/stream_peer_openssl.cpp | 13 |
1 files changed, 4 insertions, 9 deletions
diff --git a/modules/openssl/stream_peer_openssl.cpp b/modules/openssl/stream_peer_openssl.cpp index 7a9d5195a..8c5e6f83c 100644 --- a/modules/openssl/stream_peer_openssl.cpp +++ b/modules/openssl/stream_peer_openssl.cpp @@ -41,27 +41,22 @@ bool StreamPeerOpenSSL::_match_host_name(const char *name, const char *hostname) Error StreamPeerOpenSSL::_match_common_name(const char *hostname, const X509 *server_cert) { - int common_name_loc = -1; - X509_NAME_ENTRY *common_name_entry = NULL; - ASN1_STRING *common_name_asn1 = NULL; - char *common_name_str = NULL; - // Find the position of the CN field in the Subject field of the certificate - common_name_loc = X509_NAME_get_index_by_NID(X509_get_subject_name((X509 *)server_cert), NID_commonName, -1); + int common_name_loc = X509_NAME_get_index_by_NID(X509_get_subject_name((X509 *)server_cert), NID_commonName, -1); ERR_FAIL_COND_V(common_name_loc < 0, ERR_INVALID_PARAMETER); // Extract the CN field - common_name_entry = X509_NAME_get_entry(X509_get_subject_name((X509 *)server_cert), common_name_loc); + X509_NAME_ENTRY *common_name_entry = X509_NAME_get_entry(X509_get_subject_name((X509 *)server_cert), common_name_loc); ERR_FAIL_COND_V(common_name_entry == NULL, ERR_INVALID_PARAMETER); // Convert the CN field to a C string - common_name_asn1 = X509_NAME_ENTRY_get_data(common_name_entry); + ASN1_STRING *common_name_asn1 = X509_NAME_ENTRY_get_data(common_name_entry); ERR_FAIL_COND_V(common_name_asn1 == NULL, ERR_INVALID_PARAMETER); - common_name_str = (char *)ASN1_STRING_data(common_name_asn1); + char *common_name_str = (char *)ASN1_STRING_data(common_name_asn1); // Make sure there isn't an embedded NUL character in the CN bool malformed_certificate = (size_t)ASN1_STRING_length(common_name_asn1) != strlen(common_name_str); |
