aboutsummaryrefslogtreecommitdiffstats
path: root/libavformat/tls_openssl.c
diff options
context:
space:
mode:
authorDaniel N Pettersson <danielnp@axis.com>2022-03-14 15:35:07 +0100
committerMarvin Scholz <epirat07@gmail.com>2025-07-22 02:43:54 +0200
commite56fd2af1a0b65bf5a7788462cbaee3b4b909591 (patch)
tree899aa97cd42f8f43db1f5d3dab045cf82ab7429b /libavformat/tls_openssl.c
parent3cd4fa9b895a359cf8c895f601c0016aae8b2c8f (diff)
downloadffmpeg-e56fd2af1a0b65bf5a7788462cbaee3b4b909591.tar.gz
avformat/tls_openssl: add hostname for verification
When verification is enabled (using -tls_verify 1) now the hostname will be verified properly too, while before only other aspects of the certificate were checked. Co-Authored-By: Marvin Scholz <epirat07@gmail.com>
Diffstat (limited to 'libavformat/tls_openssl.c')
-rw-r--r--libavformat/tls_openssl.c15
1 files changed, 12 insertions, 3 deletions
diff --git a/libavformat/tls_openssl.c b/libavformat/tls_openssl.c
index a6b358d8f9..7845335811 100644
--- a/libavformat/tls_openssl.c
+++ b/libavformat/tls_openssl.c
@@ -31,6 +31,7 @@
#include <openssl/bio.h>
#include <openssl/ssl.h>
#include <openssl/err.h>
+#include <openssl/x509v3.h>
/**
* Returns a heap‐allocated null‐terminated string containing
@@ -938,8 +939,7 @@ static int tls_open(URLContext *h, const char *uri, int flags, AVDictionary **op
}
ret = openssl_init_ca_key_cert(h);
if (ret < 0) goto fail;
- // Note, this doesn't check that the peer certificate actually matches
- // the requested hostname.
+
if (c->verify)
SSL_CTX_set_verify(p->ctx, SSL_VERIFY_PEER|SSL_VERIFY_FAIL_IF_NO_PEER_CERT, NULL);
p->ssl = SSL_new(p->ctx);
@@ -953,8 +953,17 @@ static int tls_open(URLContext *h, const char *uri, int flags, AVDictionary **op
ret = init_bio_method(h);
if (ret < 0)
goto fail;
- if (!c->listen && !c->numerichost)
+ if (!c->listen && !c->numerichost) {
+ // By default OpenSSL does too lax wildcard matching
+ SSL_set_hostflags(p->ssl, X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS);
+ if (!SSL_set1_host(p->ssl, c->host)) {
+ av_log(h, AV_LOG_ERROR, "Failed to set hostname for TLS/SSL verification: %s\n",
+ openssl_get_error(p));
+ ret = AVERROR_EXTERNAL;
+ goto fail;
+ }
SSL_set_tlsext_host_name(p->ssl, c->host);
+ }
ret = c->listen ? SSL_accept(p->ssl) : SSL_connect(p->ssl);
if (ret == 0) {
av_log(h, AV_LOG_ERROR, "Unable to negotiate TLS/SSL session\n");