parent
55043b40c1
commit
34ebf3f90d
@ -869,7 +869,7 @@ static CURLcode bearssl_connect_step3(struct Curl_easy *data,
|
||||
|
||||
protocol = br_ssl_engine_get_selected_protocol(&backend->ctx.eng);
|
||||
if(protocol) {
|
||||
infof(data, "ALPN, server accepted to use %s", protocol);
|
||||
infof(data, VTLS_INFOF_ALPN_ACCEPTED_1STR, protocol);
|
||||
|
||||
#ifdef USE_HTTP2
|
||||
if(!strcmp(protocol, ALPN_H2))
|
||||
|
||||
@ -1263,8 +1263,8 @@ Curl_gtls_verifyserver(struct Curl_easy *data,
|
||||
if(conn->bits.tls_enable_alpn) {
|
||||
rc = gnutls_alpn_get_selected_protocol(session, &proto);
|
||||
if(rc == 0) {
|
||||
infof(data, "ALPN, server accepted to use %.*s", proto.size,
|
||||
proto.data);
|
||||
infof(data, VTLS_INFOF_ALPN_ACCEPTED_LEN_1STR, proto.size,
|
||||
proto.data);
|
||||
|
||||
#ifdef USE_HTTP2
|
||||
if(proto.size == ALPN_H2_LENGTH &&
|
||||
|
||||
@ -813,7 +813,7 @@ mbed_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
const char *next_protocol = mbedtls_ssl_get_alpn_protocol(&backend->ssl);
|
||||
|
||||
if(next_protocol) {
|
||||
infof(data, "ALPN, server accepted to use %s", next_protocol);
|
||||
infof(data, VTLS_INFOF_ALPN_ACCEPTED_1STR, next_protocol);
|
||||
#ifdef USE_NGHTTP2
|
||||
if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID,
|
||||
NGHTTP2_PROTO_VERSION_ID_LEN) &&
|
||||
|
||||
@ -866,7 +866,7 @@ static void HandshakeCallback(PRFileDesc *sock, void *arg)
|
||||
return;
|
||||
#ifdef SSL_ENABLE_ALPN
|
||||
case SSL_NEXT_PROTO_SELECTED:
|
||||
infof(data, "ALPN, server accepted to use %.*s", buflen, buf);
|
||||
infof(data, VTLS_INFOF_ALPN_ACCEPTED_LEN_1STR, buflen, buf);
|
||||
break;
|
||||
#endif
|
||||
case SSL_NEXT_PROTO_NEGOTIATED:
|
||||
|
||||
@ -3457,7 +3457,7 @@ static CURLcode ossl_connect_step2(struct Curl_easy *data,
|
||||
unsigned int len;
|
||||
SSL_get0_alpn_selected(backend->handle, &neg_protocol, &len);
|
||||
if(len) {
|
||||
infof(data, "ALPN, server accepted to use %.*s", len, neg_protocol);
|
||||
infof(data, VTLS_INFOF_ALPN_ACCEPTED_LEN_1STR, len, neg_protocol);
|
||||
|
||||
#ifdef USE_HTTP2
|
||||
if(len == ALPN_H2_LENGTH &&
|
||||
|
||||
@ -412,14 +412,14 @@ cr_set_negotiated_alpn(struct Curl_easy *data, struct connectdata *conn,
|
||||
|
||||
#ifdef USE_HTTP2
|
||||
if(len == ALPN_H2_LENGTH && 0 == memcmp(ALPN_H2, protocol, len)) {
|
||||
infof(data, "ALPN, negotiated h2");
|
||||
infof(data, VTLS_INFOF_ALPN_ACCEPTED_1STR, ALPN_H2);
|
||||
conn->negnpn = CURL_HTTP_VERSION_2;
|
||||
}
|
||||
else
|
||||
#endif
|
||||
if(len == ALPN_HTTP_1_1_LENGTH &&
|
||||
0 == memcmp(ALPN_HTTP_1_1, protocol, len)) {
|
||||
infof(data, "ALPN, negotiated http/1.1");
|
||||
infof(data, VTLS_INFOF_ALPN_ACCEPTED_1STR, ALPN_HTTP_1_1);
|
||||
conn->negnpn = CURL_HTTP_VERSION_1_1;
|
||||
}
|
||||
else {
|
||||
|
||||
@ -1416,7 +1416,7 @@ schannel_connect_step3(struct Curl_easy *data, struct connectdata *conn,
|
||||
if(alpn_result.ProtoNegoStatus ==
|
||||
SecApplicationProtocolNegotiationStatus_Success) {
|
||||
|
||||
infof(data, "schannel: ALPN, server accepted to use %.*s",
|
||||
infof(data, VTLS_INFOF_ALPN_ACCEPTED_LEN_1STR,
|
||||
alpn_result.ProtocolIdSize, alpn_result.ProtocolId);
|
||||
|
||||
#ifdef USE_HTTP2
|
||||
|
||||
@ -34,10 +34,16 @@ struct ssl_connect_data;
|
||||
#define SSLSUPP_TLS13_CIPHERSUITES (1<<5) /* supports TLS 1.3 ciphersuites */
|
||||
#define SSLSUPP_CAINFO_BLOB (1<<6)
|
||||
|
||||
#define ALPN_ACCEPTED "ALPN: server accepted "
|
||||
|
||||
#define VTLS_INFOF_NO_ALPN \
|
||||
"ALPN: server did not agree on a protocol. Uses default."
|
||||
#define VTLS_INFOF_ALPN_OFFER_1STR \
|
||||
"ALPN: offers %s"
|
||||
#define VTLS_INFOF_ALPN_ACCEPTED_1STR \
|
||||
ALPN_ACCEPTED "%s"
|
||||
#define VTLS_INFOF_ALPN_ACCEPTED_LEN_1STR \
|
||||
ALPN_ACCEPTED "%.*s"
|
||||
|
||||
struct Curl_ssl {
|
||||
/*
|
||||
|
||||
@ -757,8 +757,7 @@ wolfssl_connect_step2(struct Curl_easy *data, struct connectdata *conn,
|
||||
rc = wolfSSL_ALPN_GetProtocol(backend->handle, &protocol, &protocol_len);
|
||||
|
||||
if(rc == SSL_SUCCESS) {
|
||||
infof(data, "ALPN, server accepted to use %.*s", protocol_len,
|
||||
protocol);
|
||||
infof(data, VTLS_INFOF_ALPN_ACCEPTED_LEN_1STR, protocol_len, protocol);
|
||||
|
||||
if(protocol_len == ALPN_HTTP_1_1_LENGTH &&
|
||||
!memcmp(protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH))
|
||||
|
||||
Loading…
Reference in New Issue
Block a user