diff options
author | beck <> | 2017-01-23 08:48:45 +0000 |
---|---|---|
committer | beck <> | 2017-01-23 08:48:45 +0000 |
commit | 61af17199189570a4400f2757a9e8dab4bb76d2a (patch) | |
tree | e1f210556179334ded73129e6e0733758fe22365 | |
parent | c85967e4f9c3e1f3b3217545939f1d44ddf9f103 (diff) | |
download | openbsd-61af17199189570a4400f2757a9e8dab4bb76d2a.tar.gz openbsd-61af17199189570a4400f2757a9e8dab4bb76d2a.tar.bz2 openbsd-61af17199189570a4400f2757a9e8dab4bb76d2a.zip |
send state and rstate from ssl_st into internal. There are accessors
so these should not be diddled with directly
ok jsing@
-rw-r--r-- | src/lib/libssl/d1_both.c | 8 | ||||
-rw-r--r-- | src/lib/libssl/d1_clnt.c | 72 | ||||
-rw-r--r-- | src/lib/libssl/d1_pkt.c | 36 | ||||
-rw-r--r-- | src/lib/libssl/d1_srvr.c | 92 | ||||
-rw-r--r-- | src/lib/libssl/s23_clnt.c | 26 | ||||
-rw-r--r-- | src/lib/libssl/s23_srvr.c | 28 | ||||
-rw-r--r-- | src/lib/libssl/s3_both.c | 16 | ||||
-rw-r--r-- | src/lib/libssl/s3_clnt.c | 106 | ||||
-rw-r--r-- | src/lib/libssl/s3_lib.c | 8 | ||||
-rw-r--r-- | src/lib/libssl/s3_pkt.c | 38 | ||||
-rw-r--r-- | src/lib/libssl/s3_srvr.c | 118 | ||||
-rw-r--r-- | src/lib/libssl/ssl.h | 5 | ||||
-rw-r--r-- | src/lib/libssl/ssl_lib.c | 18 | ||||
-rw-r--r-- | src/lib/libssl/ssl_locl.h | 6 | ||||
-rw-r--r-- | src/lib/libssl/ssl_stat.c | 10 | ||||
-rw-r--r-- | src/lib/libssl/t1_lib.c | 4 |
16 files changed, 296 insertions, 295 deletions
diff --git a/src/lib/libssl/d1_both.c b/src/lib/libssl/d1_both.c index f440a8baf2..e709caa604 100644 --- a/src/lib/libssl/d1_both.c +++ b/src/lib/libssl/d1_both.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: d1_both.c,v 1.44 2017/01/23 06:45:30 beck Exp $ */ | 1 | /* $OpenBSD: d1_both.c,v 1.45 2017/01/23 08:48:44 beck Exp $ */ |
2 | /* | 2 | /* |
3 | * DTLS implementation written by Nagendra Modadugu | 3 | * DTLS implementation written by Nagendra Modadugu |
4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. | 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. |
@@ -856,7 +856,7 @@ again: | |||
856 | goto f_err; | 856 | goto f_err; |
857 | 857 | ||
858 | /* XDTLS: ressurect this when restart is in place */ | 858 | /* XDTLS: ressurect this when restart is in place */ |
859 | s->state = stn; | 859 | s->internal->state = stn; |
860 | 860 | ||
861 | if (frag_len > 0) { | 861 | if (frag_len > 0) { |
862 | unsigned char *p = (unsigned char *)s->internal->init_buf->data + DTLS1_HM_HEADER_LENGTH; | 862 | unsigned char *p = (unsigned char *)s->internal->init_buf->data + DTLS1_HM_HEADER_LENGTH; |
@@ -915,7 +915,7 @@ dtls1_send_change_cipher_spec(SSL *s, int a, int b) | |||
915 | { | 915 | { |
916 | unsigned char *p; | 916 | unsigned char *p; |
917 | 917 | ||
918 | if (s->state == a) { | 918 | if (s->internal->state == a) { |
919 | p = (unsigned char *)s->internal->init_buf->data; | 919 | p = (unsigned char *)s->internal->init_buf->data; |
920 | *p++=SSL3_MT_CCS; | 920 | *p++=SSL3_MT_CCS; |
921 | D1I(s)->handshake_write_seq = D1I(s)->next_handshake_write_seq; | 921 | D1I(s)->handshake_write_seq = D1I(s)->next_handshake_write_seq; |
@@ -929,7 +929,7 @@ dtls1_send_change_cipher_spec(SSL *s, int a, int b) | |||
929 | /* buffer the message to handle re-xmits */ | 929 | /* buffer the message to handle re-xmits */ |
930 | dtls1_buffer_message(s, 1); | 930 | dtls1_buffer_message(s, 1); |
931 | 931 | ||
932 | s->state = b; | 932 | s->internal->state = b; |
933 | } | 933 | } |
934 | 934 | ||
935 | /* SSL3_ST_CW_CHANGE_B */ | 935 | /* SSL3_ST_CW_CHANGE_B */ |
diff --git a/src/lib/libssl/d1_clnt.c b/src/lib/libssl/d1_clnt.c index 5a972f3292..9319794a66 100644 --- a/src/lib/libssl/d1_clnt.c +++ b/src/lib/libssl/d1_clnt.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: d1_clnt.c,v 1.66 2017/01/23 06:45:30 beck Exp $ */ | 1 | /* $OpenBSD: d1_clnt.c,v 1.67 2017/01/23 08:48:44 beck Exp $ */ |
2 | /* | 2 | /* |
3 | * DTLS implementation written by Nagendra Modadugu | 3 | * DTLS implementation written by Nagendra Modadugu |
4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. | 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. |
@@ -199,12 +199,12 @@ dtls1_connect(SSL *s) | |||
199 | 199 | ||
200 | 200 | ||
201 | for (;;) { | 201 | for (;;) { |
202 | state = s->state; | 202 | state = s->internal->state; |
203 | 203 | ||
204 | switch (s->state) { | 204 | switch (s->internal->state) { |
205 | case SSL_ST_RENEGOTIATE: | 205 | case SSL_ST_RENEGOTIATE: |
206 | s->internal->renegotiate = 1; | 206 | s->internal->renegotiate = 1; |
207 | s->state = SSL_ST_CONNECT; | 207 | s->internal->state = SSL_ST_CONNECT; |
208 | s->ctx->internal->stats.sess_connect_renegotiate++; | 208 | s->ctx->internal->stats.sess_connect_renegotiate++; |
209 | /* break */ | 209 | /* break */ |
210 | case SSL_ST_BEFORE: | 210 | case SSL_ST_BEFORE: |
@@ -241,7 +241,7 @@ dtls1_connect(SSL *s) | |||
241 | 241 | ||
242 | /* don't push the buffering BIO quite yet */ | 242 | /* don't push the buffering BIO quite yet */ |
243 | 243 | ||
244 | s->state = SSL3_ST_CW_CLNT_HELLO_A; | 244 | s->internal->state = SSL3_ST_CW_CLNT_HELLO_A; |
245 | s->ctx->internal->stats.sess_connect++; | 245 | s->ctx->internal->stats.sess_connect++; |
246 | s->internal->init_num = 0; | 246 | s->internal->init_num = 0; |
247 | /* mark client_random uninitialized */ | 247 | /* mark client_random uninitialized */ |
@@ -269,10 +269,10 @@ dtls1_connect(SSL *s) | |||
269 | goto end; | 269 | goto end; |
270 | 270 | ||
271 | if (D1I(s)->send_cookie) { | 271 | if (D1I(s)->send_cookie) { |
272 | s->state = SSL3_ST_CW_FLUSH; | 272 | s->internal->state = SSL3_ST_CW_FLUSH; |
273 | S3I(s)->tmp.next_state = SSL3_ST_CR_SRVR_HELLO_A; | 273 | S3I(s)->tmp.next_state = SSL3_ST_CR_SRVR_HELLO_A; |
274 | } else | 274 | } else |
275 | s->state = SSL3_ST_CR_SRVR_HELLO_A; | 275 | s->internal->state = SSL3_ST_CR_SRVR_HELLO_A; |
276 | 276 | ||
277 | s->internal->init_num = 0; | 277 | s->internal->init_num = 0; |
278 | 278 | ||
@@ -290,9 +290,9 @@ dtls1_connect(SSL *s) | |||
290 | else { | 290 | else { |
291 | if (s->internal->hit) { | 291 | if (s->internal->hit) { |
292 | 292 | ||
293 | s->state = SSL3_ST_CR_FINISHED_A; | 293 | s->internal->state = SSL3_ST_CR_FINISHED_A; |
294 | } else | 294 | } else |
295 | s->state = DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A; | 295 | s->internal->state = DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A; |
296 | } | 296 | } |
297 | s->internal->init_num = 0; | 297 | s->internal->init_num = 0; |
298 | break; | 298 | break; |
@@ -305,9 +305,9 @@ dtls1_connect(SSL *s) | |||
305 | goto end; | 305 | goto end; |
306 | dtls1_stop_timer(s); | 306 | dtls1_stop_timer(s); |
307 | if ( D1I(s)->send_cookie) /* start again, with a cookie */ | 307 | if ( D1I(s)->send_cookie) /* start again, with a cookie */ |
308 | s->state = SSL3_ST_CW_CLNT_HELLO_A; | 308 | s->internal->state = SSL3_ST_CW_CLNT_HELLO_A; |
309 | else | 309 | else |
310 | s->state = SSL3_ST_CR_CERT_A; | 310 | s->internal->state = SSL3_ST_CR_CERT_A; |
311 | s->internal->init_num = 0; | 311 | s->internal->init_num = 0; |
312 | break; | 312 | break; |
313 | 313 | ||
@@ -319,9 +319,9 @@ dtls1_connect(SSL *s) | |||
319 | if (ret == 2) { | 319 | if (ret == 2) { |
320 | s->internal->hit = 1; | 320 | s->internal->hit = 1; |
321 | if (s->internal->tlsext_ticket_expected) | 321 | if (s->internal->tlsext_ticket_expected) |
322 | s->state = SSL3_ST_CR_SESSION_TICKET_A; | 322 | s->internal->state = SSL3_ST_CR_SESSION_TICKET_A; |
323 | else | 323 | else |
324 | s->state = SSL3_ST_CR_FINISHED_A; | 324 | s->internal->state = SSL3_ST_CR_FINISHED_A; |
325 | s->internal->init_num = 0; | 325 | s->internal->init_num = 0; |
326 | break; | 326 | break; |
327 | } | 327 | } |
@@ -332,12 +332,12 @@ dtls1_connect(SSL *s) | |||
332 | if (ret <= 0) | 332 | if (ret <= 0) |
333 | goto end; | 333 | goto end; |
334 | if (s->internal->tlsext_status_expected) | 334 | if (s->internal->tlsext_status_expected) |
335 | s->state = SSL3_ST_CR_CERT_STATUS_A; | 335 | s->internal->state = SSL3_ST_CR_CERT_STATUS_A; |
336 | else | 336 | else |
337 | s->state = SSL3_ST_CR_KEY_EXCH_A; | 337 | s->internal->state = SSL3_ST_CR_KEY_EXCH_A; |
338 | } else { | 338 | } else { |
339 | skip = 1; | 339 | skip = 1; |
340 | s->state = SSL3_ST_CR_KEY_EXCH_A; | 340 | s->internal->state = SSL3_ST_CR_KEY_EXCH_A; |
341 | } | 341 | } |
342 | s->internal->init_num = 0; | 342 | s->internal->init_num = 0; |
343 | break; | 343 | break; |
@@ -347,7 +347,7 @@ dtls1_connect(SSL *s) | |||
347 | ret = ssl3_get_server_key_exchange(s); | 347 | ret = ssl3_get_server_key_exchange(s); |
348 | if (ret <= 0) | 348 | if (ret <= 0) |
349 | goto end; | 349 | goto end; |
350 | s->state = SSL3_ST_CR_CERT_REQ_A; | 350 | s->internal->state = SSL3_ST_CR_CERT_REQ_A; |
351 | s->internal->init_num = 0; | 351 | s->internal->init_num = 0; |
352 | 352 | ||
353 | /* at this point we check that we have the | 353 | /* at this point we check that we have the |
@@ -363,7 +363,7 @@ dtls1_connect(SSL *s) | |||
363 | ret = ssl3_get_certificate_request(s); | 363 | ret = ssl3_get_certificate_request(s); |
364 | if (ret <= 0) | 364 | if (ret <= 0) |
365 | goto end; | 365 | goto end; |
366 | s->state = SSL3_ST_CR_SRVR_DONE_A; | 366 | s->internal->state = SSL3_ST_CR_SRVR_DONE_A; |
367 | s->internal->init_num = 0; | 367 | s->internal->init_num = 0; |
368 | break; | 368 | break; |
369 | 369 | ||
@@ -378,7 +378,7 @@ dtls1_connect(SSL *s) | |||
378 | else | 378 | else |
379 | S3I(s)->tmp.next_state = SSL3_ST_CW_KEY_EXCH_A; | 379 | S3I(s)->tmp.next_state = SSL3_ST_CW_KEY_EXCH_A; |
380 | s->internal->init_num = 0; | 380 | s->internal->init_num = 0; |
381 | s->state = S3I(s)->tmp.next_state; | 381 | s->internal->state = S3I(s)->tmp.next_state; |
382 | break; | 382 | break; |
383 | 383 | ||
384 | case SSL3_ST_CW_CERT_A: | 384 | case SSL3_ST_CW_CERT_A: |
@@ -389,7 +389,7 @@ dtls1_connect(SSL *s) | |||
389 | ret = ssl3_send_client_certificate(s); | 389 | ret = ssl3_send_client_certificate(s); |
390 | if (ret <= 0) | 390 | if (ret <= 0) |
391 | goto end; | 391 | goto end; |
392 | s->state = SSL3_ST_CW_KEY_EXCH_A; | 392 | s->internal->state = SSL3_ST_CW_KEY_EXCH_A; |
393 | s->internal->init_num = 0; | 393 | s->internal->init_num = 0; |
394 | break; | 394 | break; |
395 | 395 | ||
@@ -405,9 +405,9 @@ dtls1_connect(SSL *s) | |||
405 | /* For TLS, cert_req is set to 2, so a cert chain | 405 | /* For TLS, cert_req is set to 2, so a cert chain |
406 | * of nothing is sent, but no verify packet is sent */ | 406 | * of nothing is sent, but no verify packet is sent */ |
407 | if (S3I(s)->tmp.cert_req == 1) { | 407 | if (S3I(s)->tmp.cert_req == 1) { |
408 | s->state = SSL3_ST_CW_CERT_VRFY_A; | 408 | s->internal->state = SSL3_ST_CW_CERT_VRFY_A; |
409 | } else { | 409 | } else { |
410 | s->state = SSL3_ST_CW_CHANGE_A; | 410 | s->internal->state = SSL3_ST_CW_CHANGE_A; |
411 | S3I(s)->change_cipher_spec = 0; | 411 | S3I(s)->change_cipher_spec = 0; |
412 | } | 412 | } |
413 | 413 | ||
@@ -420,7 +420,7 @@ dtls1_connect(SSL *s) | |||
420 | ret = ssl3_send_client_verify(s); | 420 | ret = ssl3_send_client_verify(s); |
421 | if (ret <= 0) | 421 | if (ret <= 0) |
422 | goto end; | 422 | goto end; |
423 | s->state = SSL3_ST_CW_CHANGE_A; | 423 | s->internal->state = SSL3_ST_CW_CHANGE_A; |
424 | s->internal->init_num = 0; | 424 | s->internal->init_num = 0; |
425 | S3I(s)->change_cipher_spec = 0; | 425 | S3I(s)->change_cipher_spec = 0; |
426 | break; | 426 | break; |
@@ -434,7 +434,7 @@ dtls1_connect(SSL *s) | |||
434 | if (ret <= 0) | 434 | if (ret <= 0) |
435 | goto end; | 435 | goto end; |
436 | 436 | ||
437 | s->state = SSL3_ST_CW_FINISHED_A; | 437 | s->internal->state = SSL3_ST_CW_FINISHED_A; |
438 | s->internal->init_num = 0; | 438 | s->internal->init_num = 0; |
439 | 439 | ||
440 | s->session->cipher = S3I(s)->tmp.new_cipher; | 440 | s->session->cipher = S3I(s)->tmp.new_cipher; |
@@ -463,14 +463,14 @@ dtls1_connect(SSL *s) | |||
463 | s->method->ssl3_enc->client_finished_label_len); | 463 | s->method->ssl3_enc->client_finished_label_len); |
464 | if (ret <= 0) | 464 | if (ret <= 0) |
465 | goto end; | 465 | goto end; |
466 | s->state = SSL3_ST_CW_FLUSH; | 466 | s->internal->state = SSL3_ST_CW_FLUSH; |
467 | 467 | ||
468 | /* clear flags */ | 468 | /* clear flags */ |
469 | s->s3->flags&= ~SSL3_FLAGS_POP_BUFFER; | 469 | s->s3->flags&= ~SSL3_FLAGS_POP_BUFFER; |
470 | if (s->internal->hit) { | 470 | if (s->internal->hit) { |
471 | S3I(s)->tmp.next_state = SSL_ST_OK; | 471 | S3I(s)->tmp.next_state = SSL_ST_OK; |
472 | if (s->s3->flags & SSL3_FLAGS_DELAY_CLIENT_FINISHED) { | 472 | if (s->s3->flags & SSL3_FLAGS_DELAY_CLIENT_FINISHED) { |
473 | s->state = SSL_ST_OK; | 473 | s->internal->state = SSL_ST_OK; |
474 | s->s3->flags |= SSL3_FLAGS_POP_BUFFER; | 474 | s->s3->flags |= SSL3_FLAGS_POP_BUFFER; |
475 | S3I(s)->delay_buf_pop_ret = 0; | 475 | S3I(s)->delay_buf_pop_ret = 0; |
476 | } | 476 | } |
@@ -492,7 +492,7 @@ dtls1_connect(SSL *s) | |||
492 | ret = ssl3_get_new_session_ticket(s); | 492 | ret = ssl3_get_new_session_ticket(s); |
493 | if (ret <= 0) | 493 | if (ret <= 0) |
494 | goto end; | 494 | goto end; |
495 | s->state = SSL3_ST_CR_FINISHED_A; | 495 | s->internal->state = SSL3_ST_CR_FINISHED_A; |
496 | s->internal->init_num = 0; | 496 | s->internal->init_num = 0; |
497 | break; | 497 | break; |
498 | 498 | ||
@@ -501,7 +501,7 @@ dtls1_connect(SSL *s) | |||
501 | ret = ssl3_get_cert_status(s); | 501 | ret = ssl3_get_cert_status(s); |
502 | if (ret <= 0) | 502 | if (ret <= 0) |
503 | goto end; | 503 | goto end; |
504 | s->state = SSL3_ST_CR_KEY_EXCH_A; | 504 | s->internal->state = SSL3_ST_CR_KEY_EXCH_A; |
505 | s->internal->init_num = 0; | 505 | s->internal->init_num = 0; |
506 | break; | 506 | break; |
507 | 507 | ||
@@ -515,9 +515,9 @@ dtls1_connect(SSL *s) | |||
515 | dtls1_stop_timer(s); | 515 | dtls1_stop_timer(s); |
516 | 516 | ||
517 | if (s->internal->hit) | 517 | if (s->internal->hit) |
518 | s->state = SSL3_ST_CW_CHANGE_A; | 518 | s->internal->state = SSL3_ST_CW_CHANGE_A; |
519 | else | 519 | else |
520 | s->state = SSL_ST_OK; | 520 | s->internal->state = SSL_ST_OK; |
521 | 521 | ||
522 | 522 | ||
523 | s->internal->init_num = 0; | 523 | s->internal->init_num = 0; |
@@ -529,14 +529,14 @@ dtls1_connect(SSL *s) | |||
529 | /* If the write error was fatal, stop trying */ | 529 | /* If the write error was fatal, stop trying */ |
530 | if (!BIO_should_retry(s->wbio)) { | 530 | if (!BIO_should_retry(s->wbio)) { |
531 | s->internal->rwstate = SSL_NOTHING; | 531 | s->internal->rwstate = SSL_NOTHING; |
532 | s->state = S3I(s)->tmp.next_state; | 532 | s->internal->state = S3I(s)->tmp.next_state; |
533 | } | 533 | } |
534 | 534 | ||
535 | ret = -1; | 535 | ret = -1; |
536 | goto end; | 536 | goto end; |
537 | } | 537 | } |
538 | s->internal->rwstate = SSL_NOTHING; | 538 | s->internal->rwstate = SSL_NOTHING; |
539 | s->state = S3I(s)->tmp.next_state; | 539 | s->internal->state = S3I(s)->tmp.next_state; |
540 | break; | 540 | break; |
541 | 541 | ||
542 | case SSL_ST_OK: | 542 | case SSL_ST_OK: |
@@ -585,11 +585,11 @@ dtls1_connect(SSL *s) | |||
585 | goto end; | 585 | goto end; |
586 | } | 586 | } |
587 | 587 | ||
588 | if ((cb != NULL) && (s->state != state)) { | 588 | if ((cb != NULL) && (s->internal->state != state)) { |
589 | new_state = s->state; | 589 | new_state = s->internal->state; |
590 | s->state = state; | 590 | s->internal->state = state; |
591 | cb(s, SSL_CB_CONNECT_LOOP, 1); | 591 | cb(s, SSL_CB_CONNECT_LOOP, 1); |
592 | s->state = new_state; | 592 | s->internal->state = new_state; |
593 | } | 593 | } |
594 | } | 594 | } |
595 | skip = 0; | 595 | skip = 0; |
diff --git a/src/lib/libssl/d1_pkt.c b/src/lib/libssl/d1_pkt.c index 2768d7ed9c..1dba3d0c4d 100644 --- a/src/lib/libssl/d1_pkt.c +++ b/src/lib/libssl/d1_pkt.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: d1_pkt.c,v 1.55 2017/01/23 08:08:06 beck Exp $ */ | 1 | /* $OpenBSD: d1_pkt.c,v 1.56 2017/01/23 08:48:44 beck Exp $ */ |
2 | /* | 2 | /* |
3 | * DTLS implementation written by Nagendra Modadugu | 3 | * DTLS implementation written by Nagendra Modadugu |
4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. | 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. |
@@ -495,7 +495,7 @@ again: | |||
495 | } | 495 | } |
496 | 496 | ||
497 | /* check if we have the header */ | 497 | /* check if we have the header */ |
498 | if ((s->rstate != SSL_ST_READ_BODY) || | 498 | if ((s->internal->rstate != SSL_ST_READ_BODY) || |
499 | (s->internal->packet_length < DTLS1_RT_HEADER_LENGTH)) { | 499 | (s->internal->packet_length < DTLS1_RT_HEADER_LENGTH)) { |
500 | CBS header, seq_no; | 500 | CBS header, seq_no; |
501 | uint16_t epoch, len, ssl_version; | 501 | uint16_t epoch, len, ssl_version; |
@@ -510,7 +510,7 @@ again: | |||
510 | if (s->internal->packet_length != DTLS1_RT_HEADER_LENGTH) | 510 | if (s->internal->packet_length != DTLS1_RT_HEADER_LENGTH) |
511 | goto again; | 511 | goto again; |
512 | 512 | ||
513 | s->rstate = SSL_ST_READ_BODY; | 513 | s->internal->rstate = SSL_ST_READ_BODY; |
514 | 514 | ||
515 | CBS_init(&header, s->internal->packet, s->internal->packet_length); | 515 | CBS_init(&header, s->internal->packet, s->internal->packet_length); |
516 | 516 | ||
@@ -547,11 +547,11 @@ again: | |||
547 | if (rr->length > SSL3_RT_MAX_ENCRYPTED_LENGTH) | 547 | if (rr->length > SSL3_RT_MAX_ENCRYPTED_LENGTH) |
548 | goto again; | 548 | goto again; |
549 | 549 | ||
550 | /* now s->rstate == SSL_ST_READ_BODY */ | 550 | /* now s->internal->rstate == SSL_ST_READ_BODY */ |
551 | p = (unsigned char *)CBS_data(&header); | 551 | p = (unsigned char *)CBS_data(&header); |
552 | } | 552 | } |
553 | 553 | ||
554 | /* s->rstate == SSL_ST_READ_BODY, get and decode the data */ | 554 | /* s->internal->rstate == SSL_ST_READ_BODY, get and decode the data */ |
555 | 555 | ||
556 | if (rr->length > s->internal->packet_length - DTLS1_RT_HEADER_LENGTH) { | 556 | if (rr->length > s->internal->packet_length - DTLS1_RT_HEADER_LENGTH) { |
557 | /* now s->internal->packet_length == DTLS1_RT_HEADER_LENGTH */ | 557 | /* now s->internal->packet_length == DTLS1_RT_HEADER_LENGTH */ |
@@ -567,7 +567,7 @@ again: | |||
567 | /* now n == rr->length, | 567 | /* now n == rr->length, |
568 | * and s->internal->packet_length == DTLS1_RT_HEADER_LENGTH + rr->length */ | 568 | * and s->internal->packet_length == DTLS1_RT_HEADER_LENGTH + rr->length */ |
569 | } | 569 | } |
570 | s->rstate = SSL_ST_READ_HEADER; /* set state for later operations */ | 570 | s->internal->rstate = SSL_ST_READ_HEADER; /* set state for later operations */ |
571 | 571 | ||
572 | /* match epochs. NULL means the packet is dropped on the floor */ | 572 | /* match epochs. NULL means the packet is dropped on the floor */ |
573 | bitmap = dtls1_get_bitmap(s, rr, &is_next_epoch); | 573 | bitmap = dtls1_get_bitmap(s, rr, &is_next_epoch); |
@@ -692,7 +692,7 @@ start: | |||
692 | * so process data buffered during the last handshake | 692 | * so process data buffered during the last handshake |
693 | * in advance, if any. | 693 | * in advance, if any. |
694 | */ | 694 | */ |
695 | if (s->state == SSL_ST_OK && rr->length == 0) { | 695 | if (s->internal->state == SSL_ST_OK && rr->length == 0) { |
696 | pitem *item; | 696 | pitem *item; |
697 | item = pqueue_pop(D1I(s)->buffered_app_data.q); | 697 | item = pqueue_pop(D1I(s)->buffered_app_data.q); |
698 | if (item) { | 698 | if (item) { |
@@ -709,7 +709,7 @@ start: | |||
709 | goto start; | 709 | goto start; |
710 | 710 | ||
711 | /* get new packet if necessary */ | 711 | /* get new packet if necessary */ |
712 | if ((rr->length == 0) || (s->rstate == SSL_ST_READ_BODY)) { | 712 | if ((rr->length == 0) || (s->internal->rstate == SSL_ST_READ_BODY)) { |
713 | ret = dtls1_get_record(s); | 713 | ret = dtls1_get_record(s); |
714 | if (ret <= 0) { | 714 | if (ret <= 0) { |
715 | ret = dtls1_read_failed(s, ret); | 715 | ret = dtls1_read_failed(s, ret); |
@@ -778,7 +778,7 @@ start: | |||
778 | rr->length -= n; | 778 | rr->length -= n; |
779 | rr->off += n; | 779 | rr->off += n; |
780 | if (rr->length == 0) { | 780 | if (rr->length == 0) { |
781 | s->rstate = SSL_ST_READ_HEADER; | 781 | s->internal->rstate = SSL_ST_READ_HEADER; |
782 | rr->off = 0; | 782 | rr->off = 0; |
783 | } | 783 | } |
784 | } | 784 | } |
@@ -840,7 +840,7 @@ start: | |||
840 | */ | 840 | */ |
841 | FIX ME | 841 | FIX ME |
842 | #endif | 842 | #endif |
843 | s->rstate = SSL_ST_READ_HEADER; | 843 | s->internal->rstate = SSL_ST_READ_HEADER; |
844 | rr->length = 0; | 844 | rr->length = 0; |
845 | goto start; | 845 | goto start; |
846 | } | 846 | } |
@@ -1035,9 +1035,9 @@ start: | |||
1035 | goto start; | 1035 | goto start; |
1036 | } | 1036 | } |
1037 | 1037 | ||
1038 | if (((s->state&SSL_ST_MASK) == SSL_ST_OK) && | 1038 | if (((s->internal->state&SSL_ST_MASK) == SSL_ST_OK) && |
1039 | !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS)) { | 1039 | !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS)) { |
1040 | s->state = s->server ? SSL_ST_ACCEPT : SSL_ST_CONNECT; | 1040 | s->internal->state = s->server ? SSL_ST_ACCEPT : SSL_ST_CONNECT; |
1041 | s->internal->renegotiate = 1; | 1041 | s->internal->renegotiate = 1; |
1042 | s->internal->new_session = 1; | 1042 | s->internal->new_session = 1; |
1043 | } | 1043 | } |
@@ -1096,12 +1096,12 @@ start: | |||
1096 | */ | 1096 | */ |
1097 | if (S3I(s)->in_read_app_data && | 1097 | if (S3I(s)->in_read_app_data && |
1098 | (S3I(s)->total_renegotiations != 0) && | 1098 | (S3I(s)->total_renegotiations != 0) && |
1099 | (((s->state & SSL_ST_CONNECT) && | 1099 | (((s->internal->state & SSL_ST_CONNECT) && |
1100 | (s->state >= SSL3_ST_CW_CLNT_HELLO_A) && | 1100 | (s->internal->state >= SSL3_ST_CW_CLNT_HELLO_A) && |
1101 | (s->state <= SSL3_ST_CR_SRVR_HELLO_A)) || ( | 1101 | (s->internal->state <= SSL3_ST_CR_SRVR_HELLO_A)) || ( |
1102 | (s->state & SSL_ST_ACCEPT) && | 1102 | (s->internal->state & SSL_ST_ACCEPT) && |
1103 | (s->state <= SSL3_ST_SW_HELLO_REQ_A) && | 1103 | (s->internal->state <= SSL3_ST_SW_HELLO_REQ_A) && |
1104 | (s->state >= SSL3_ST_SR_CLNT_HELLO_A)))) { | 1104 | (s->internal->state >= SSL3_ST_SR_CLNT_HELLO_A)))) { |
1105 | S3I(s)->in_read_app_data = 2; | 1105 | S3I(s)->in_read_app_data = 2; |
1106 | return (-1); | 1106 | return (-1); |
1107 | } else { | 1107 | } else { |
diff --git a/src/lib/libssl/d1_srvr.c b/src/lib/libssl/d1_srvr.c index 78816cda46..81a05eb30e 100644 --- a/src/lib/libssl/d1_srvr.c +++ b/src/lib/libssl/d1_srvr.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: d1_srvr.c,v 1.76 2017/01/23 06:45:30 beck Exp $ */ | 1 | /* $OpenBSD: d1_srvr.c,v 1.77 2017/01/23 08:48:44 beck Exp $ */ |
2 | /* | 2 | /* |
3 | * DTLS implementation written by Nagendra Modadugu | 3 | * DTLS implementation written by Nagendra Modadugu |
4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. | 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. |
@@ -209,12 +209,12 @@ dtls1_accept(SSL *s) | |||
209 | } | 209 | } |
210 | 210 | ||
211 | for (;;) { | 211 | for (;;) { |
212 | state = s->state; | 212 | state = s->internal->state; |
213 | 213 | ||
214 | switch (s->state) { | 214 | switch (s->internal->state) { |
215 | case SSL_ST_RENEGOTIATE: | 215 | case SSL_ST_RENEGOTIATE: |
216 | s->internal->renegotiate = 1; | 216 | s->internal->renegotiate = 1; |
217 | /* s->state=SSL_ST_ACCEPT; */ | 217 | /* s->internal->state=SSL_ST_ACCEPT; */ |
218 | 218 | ||
219 | case SSL_ST_BEFORE: | 219 | case SSL_ST_BEFORE: |
220 | case SSL_ST_ACCEPT: | 220 | case SSL_ST_ACCEPT: |
@@ -243,7 +243,7 @@ dtls1_accept(SSL *s) | |||
243 | 243 | ||
244 | s->internal->init_num = 0; | 244 | s->internal->init_num = 0; |
245 | 245 | ||
246 | if (s->state != SSL_ST_RENEGOTIATE) { | 246 | if (s->internal->state != SSL_ST_RENEGOTIATE) { |
247 | /* Ok, we now need to push on a buffering BIO so that | 247 | /* Ok, we now need to push on a buffering BIO so that |
248 | * the output is sent in a way that TCP likes :-) | 248 | * the output is sent in a way that TCP likes :-) |
249 | * ...but not with SCTP :-) | 249 | * ...but not with SCTP :-) |
@@ -258,13 +258,13 @@ dtls1_accept(SSL *s) | |||
258 | goto end; | 258 | goto end; |
259 | } | 259 | } |
260 | 260 | ||
261 | s->state = SSL3_ST_SR_CLNT_HELLO_A; | 261 | s->internal->state = SSL3_ST_SR_CLNT_HELLO_A; |
262 | s->ctx->internal->stats.sess_accept++; | 262 | s->ctx->internal->stats.sess_accept++; |
263 | } else { | 263 | } else { |
264 | /* s->state == SSL_ST_RENEGOTIATE, | 264 | /* s->internal->state == SSL_ST_RENEGOTIATE, |
265 | * we will just send a HelloRequest */ | 265 | * we will just send a HelloRequest */ |
266 | s->ctx->internal->stats.sess_accept_renegotiate++; | 266 | s->ctx->internal->stats.sess_accept_renegotiate++; |
267 | s->state = SSL3_ST_SW_HELLO_REQ_A; | 267 | s->internal->state = SSL3_ST_SW_HELLO_REQ_A; |
268 | } | 268 | } |
269 | 269 | ||
270 | break; | 270 | break; |
@@ -279,7 +279,7 @@ dtls1_accept(SSL *s) | |||
279 | if (ret <= 0) | 279 | if (ret <= 0) |
280 | goto end; | 280 | goto end; |
281 | S3I(s)->tmp.next_state = SSL3_ST_SR_CLNT_HELLO_A; | 281 | S3I(s)->tmp.next_state = SSL3_ST_SR_CLNT_HELLO_A; |
282 | s->state = SSL3_ST_SW_FLUSH; | 282 | s->internal->state = SSL3_ST_SW_FLUSH; |
283 | s->internal->init_num = 0; | 283 | s->internal->init_num = 0; |
284 | 284 | ||
285 | if (!tls1_init_finished_mac(s)) { | 285 | if (!tls1_init_finished_mac(s)) { |
@@ -289,7 +289,7 @@ dtls1_accept(SSL *s) | |||
289 | break; | 289 | break; |
290 | 290 | ||
291 | case SSL3_ST_SW_HELLO_REQ_C: | 291 | case SSL3_ST_SW_HELLO_REQ_C: |
292 | s->state = SSL_ST_OK; | 292 | s->internal->state = SSL_ST_OK; |
293 | break; | 293 | break; |
294 | 294 | ||
295 | case SSL3_ST_SR_CLNT_HELLO_A: | 295 | case SSL3_ST_SR_CLNT_HELLO_A: |
@@ -303,9 +303,9 @@ dtls1_accept(SSL *s) | |||
303 | dtls1_stop_timer(s); | 303 | dtls1_stop_timer(s); |
304 | 304 | ||
305 | if (ret == 1 && (SSL_get_options(s) & SSL_OP_COOKIE_EXCHANGE)) | 305 | if (ret == 1 && (SSL_get_options(s) & SSL_OP_COOKIE_EXCHANGE)) |
306 | s->state = DTLS1_ST_SW_HELLO_VERIFY_REQUEST_A; | 306 | s->internal->state = DTLS1_ST_SW_HELLO_VERIFY_REQUEST_A; |
307 | else | 307 | else |
308 | s->state = SSL3_ST_SW_SRVR_HELLO_A; | 308 | s->internal->state = SSL3_ST_SW_SRVR_HELLO_A; |
309 | 309 | ||
310 | s->internal->init_num = 0; | 310 | s->internal->init_num = 0; |
311 | 311 | ||
@@ -315,7 +315,7 @@ dtls1_accept(SSL *s) | |||
315 | } | 315 | } |
316 | 316 | ||
317 | /* If we're just listening, stop here */ | 317 | /* If we're just listening, stop here */ |
318 | if (listen && s->state == SSL3_ST_SW_SRVR_HELLO_A) { | 318 | if (listen && s->internal->state == SSL3_ST_SW_SRVR_HELLO_A) { |
319 | ret = 2; | 319 | ret = 2; |
320 | D1I(s)->listen = 0; | 320 | D1I(s)->listen = 0; |
321 | /* Set expected sequence numbers | 321 | /* Set expected sequence numbers |
@@ -335,7 +335,7 @@ dtls1_accept(SSL *s) | |||
335 | ret = dtls1_send_hello_verify_request(s); | 335 | ret = dtls1_send_hello_verify_request(s); |
336 | if (ret <= 0) | 336 | if (ret <= 0) |
337 | goto end; | 337 | goto end; |
338 | s->state = SSL3_ST_SW_FLUSH; | 338 | s->internal->state = SSL3_ST_SW_FLUSH; |
339 | S3I(s)->tmp.next_state = SSL3_ST_SR_CLNT_HELLO_A; | 339 | S3I(s)->tmp.next_state = SSL3_ST_SR_CLNT_HELLO_A; |
340 | 340 | ||
341 | /* HelloVerifyRequest resets Finished MAC */ | 341 | /* HelloVerifyRequest resets Finished MAC */ |
@@ -356,11 +356,11 @@ dtls1_accept(SSL *s) | |||
356 | 356 | ||
357 | if (s->internal->hit) { | 357 | if (s->internal->hit) { |
358 | if (s->internal->tlsext_ticket_expected) | 358 | if (s->internal->tlsext_ticket_expected) |
359 | s->state = SSL3_ST_SW_SESSION_TICKET_A; | 359 | s->internal->state = SSL3_ST_SW_SESSION_TICKET_A; |
360 | else | 360 | else |
361 | s->state = SSL3_ST_SW_CHANGE_A; | 361 | s->internal->state = SSL3_ST_SW_CHANGE_A; |
362 | } else | 362 | } else |
363 | s->state = SSL3_ST_SW_CERT_A; | 363 | s->internal->state = SSL3_ST_SW_CERT_A; |
364 | s->internal->init_num = 0; | 364 | s->internal->init_num = 0; |
365 | break; | 365 | break; |
366 | 366 | ||
@@ -374,12 +374,12 @@ dtls1_accept(SSL *s) | |||
374 | if (ret <= 0) | 374 | if (ret <= 0) |
375 | goto end; | 375 | goto end; |
376 | if (s->internal->tlsext_status_expected) | 376 | if (s->internal->tlsext_status_expected) |
377 | s->state = SSL3_ST_SW_CERT_STATUS_A; | 377 | s->internal->state = SSL3_ST_SW_CERT_STATUS_A; |
378 | else | 378 | else |
379 | s->state = SSL3_ST_SW_KEY_EXCH_A; | 379 | s->internal->state = SSL3_ST_SW_KEY_EXCH_A; |
380 | } else { | 380 | } else { |
381 | skip = 1; | 381 | skip = 1; |
382 | s->state = SSL3_ST_SW_KEY_EXCH_A; | 382 | s->internal->state = SSL3_ST_SW_KEY_EXCH_A; |
383 | } | 383 | } |
384 | s->internal->init_num = 0; | 384 | s->internal->init_num = 0; |
385 | break; | 385 | break; |
@@ -397,7 +397,7 @@ dtls1_accept(SSL *s) | |||
397 | } else | 397 | } else |
398 | skip = 1; | 398 | skip = 1; |
399 | 399 | ||
400 | s->state = SSL3_ST_SW_CERT_REQ_A; | 400 | s->internal->state = SSL3_ST_SW_CERT_REQ_A; |
401 | s->internal->init_num = 0; | 401 | s->internal->init_num = 0; |
402 | break; | 402 | break; |
403 | 403 | ||
@@ -429,14 +429,14 @@ dtls1_accept(SSL *s) | |||
429 | /* no cert request */ | 429 | /* no cert request */ |
430 | skip = 1; | 430 | skip = 1; |
431 | S3I(s)->tmp.cert_request = 0; | 431 | S3I(s)->tmp.cert_request = 0; |
432 | s->state = SSL3_ST_SW_SRVR_DONE_A; | 432 | s->internal->state = SSL3_ST_SW_SRVR_DONE_A; |
433 | } else { | 433 | } else { |
434 | S3I(s)->tmp.cert_request = 1; | 434 | S3I(s)->tmp.cert_request = 1; |
435 | dtls1_start_timer(s); | 435 | dtls1_start_timer(s); |
436 | ret = ssl3_send_certificate_request(s); | 436 | ret = ssl3_send_certificate_request(s); |
437 | if (ret <= 0) | 437 | if (ret <= 0) |
438 | goto end; | 438 | goto end; |
439 | s->state = SSL3_ST_SW_SRVR_DONE_A; | 439 | s->internal->state = SSL3_ST_SW_SRVR_DONE_A; |
440 | s->internal->init_num = 0; | 440 | s->internal->init_num = 0; |
441 | } | 441 | } |
442 | break; | 442 | break; |
@@ -448,7 +448,7 @@ dtls1_accept(SSL *s) | |||
448 | if (ret <= 0) | 448 | if (ret <= 0) |
449 | goto end; | 449 | goto end; |
450 | S3I(s)->tmp.next_state = SSL3_ST_SR_CERT_A; | 450 | S3I(s)->tmp.next_state = SSL3_ST_SR_CERT_A; |
451 | s->state = SSL3_ST_SW_FLUSH; | 451 | s->internal->state = SSL3_ST_SW_FLUSH; |
452 | s->internal->init_num = 0; | 452 | s->internal->init_num = 0; |
453 | break; | 453 | break; |
454 | 454 | ||
@@ -458,14 +458,14 @@ dtls1_accept(SSL *s) | |||
458 | /* If the write error was fatal, stop trying */ | 458 | /* If the write error was fatal, stop trying */ |
459 | if (!BIO_should_retry(s->wbio)) { | 459 | if (!BIO_should_retry(s->wbio)) { |
460 | s->internal->rwstate = SSL_NOTHING; | 460 | s->internal->rwstate = SSL_NOTHING; |
461 | s->state = S3I(s)->tmp.next_state; | 461 | s->internal->state = S3I(s)->tmp.next_state; |
462 | } | 462 | } |
463 | 463 | ||
464 | ret = -1; | 464 | ret = -1; |
465 | goto end; | 465 | goto end; |
466 | } | 466 | } |
467 | s->internal->rwstate = SSL_NOTHING; | 467 | s->internal->rwstate = SSL_NOTHING; |
468 | s->state = S3I(s)->tmp.next_state; | 468 | s->internal->state = S3I(s)->tmp.next_state; |
469 | break; | 469 | break; |
470 | 470 | ||
471 | case SSL3_ST_SR_CERT_A: | 471 | case SSL3_ST_SR_CERT_A: |
@@ -476,7 +476,7 @@ dtls1_accept(SSL *s) | |||
476 | goto end; | 476 | goto end; |
477 | } | 477 | } |
478 | s->internal->init_num = 0; | 478 | s->internal->init_num = 0; |
479 | s->state = SSL3_ST_SR_KEY_EXCH_A; | 479 | s->internal->state = SSL3_ST_SR_KEY_EXCH_A; |
480 | break; | 480 | break; |
481 | 481 | ||
482 | case SSL3_ST_SR_KEY_EXCH_A: | 482 | case SSL3_ST_SR_KEY_EXCH_A: |
@@ -485,7 +485,7 @@ dtls1_accept(SSL *s) | |||
485 | if (ret <= 0) | 485 | if (ret <= 0) |
486 | goto end; | 486 | goto end; |
487 | 487 | ||
488 | s->state = SSL3_ST_SR_CERT_VRFY_A; | 488 | s->internal->state = SSL3_ST_SR_CERT_VRFY_A; |
489 | s->internal->init_num = 0; | 489 | s->internal->init_num = 0; |
490 | 490 | ||
491 | if (ret == 2) { | 491 | if (ret == 2) { |
@@ -494,10 +494,10 @@ dtls1_accept(SSL *s) | |||
494 | * a certificate, the CertificateVerify | 494 | * a certificate, the CertificateVerify |
495 | * message is not sent. | 495 | * message is not sent. |
496 | */ | 496 | */ |
497 | s->state = SSL3_ST_SR_FINISHED_A; | 497 | s->internal->state = SSL3_ST_SR_FINISHED_A; |
498 | s->internal->init_num = 0; | 498 | s->internal->init_num = 0; |
499 | } else if (SSL_USE_SIGALGS(s)) { | 499 | } else if (SSL_USE_SIGALGS(s)) { |
500 | s->state = SSL3_ST_SR_CERT_VRFY_A; | 500 | s->internal->state = SSL3_ST_SR_CERT_VRFY_A; |
501 | s->internal->init_num = 0; | 501 | s->internal->init_num = 0; |
502 | if (!s->session->peer) | 502 | if (!s->session->peer) |
503 | break; | 503 | break; |
@@ -518,7 +518,7 @@ dtls1_accept(SSL *s) | |||
518 | goto end; | 518 | goto end; |
519 | } | 519 | } |
520 | } else { | 520 | } else { |
521 | s->state = SSL3_ST_SR_CERT_VRFY_A; | 521 | s->internal->state = SSL3_ST_SR_CERT_VRFY_A; |
522 | s->internal->init_num = 0; | 522 | s->internal->init_num = 0; |
523 | 523 | ||
524 | /* We need to get hashes here so if there is | 524 | /* We need to get hashes here so if there is |
@@ -539,7 +539,7 @@ dtls1_accept(SSL *s) | |||
539 | ret = ssl3_get_cert_verify(s); | 539 | ret = ssl3_get_cert_verify(s); |
540 | if (ret <= 0) | 540 | if (ret <= 0) |
541 | goto end; | 541 | goto end; |
542 | s->state = SSL3_ST_SR_FINISHED_A; | 542 | s->internal->state = SSL3_ST_SR_FINISHED_A; |
543 | s->internal->init_num = 0; | 543 | s->internal->init_num = 0; |
544 | break; | 544 | break; |
545 | 545 | ||
@@ -552,11 +552,11 @@ dtls1_accept(SSL *s) | |||
552 | goto end; | 552 | goto end; |
553 | dtls1_stop_timer(s); | 553 | dtls1_stop_timer(s); |
554 | if (s->internal->hit) | 554 | if (s->internal->hit) |
555 | s->state = SSL_ST_OK; | 555 | s->internal->state = SSL_ST_OK; |
556 | else if (s->internal->tlsext_ticket_expected) | 556 | else if (s->internal->tlsext_ticket_expected) |
557 | s->state = SSL3_ST_SW_SESSION_TICKET_A; | 557 | s->internal->state = SSL3_ST_SW_SESSION_TICKET_A; |
558 | else | 558 | else |
559 | s->state = SSL3_ST_SW_CHANGE_A; | 559 | s->internal->state = SSL3_ST_SW_CHANGE_A; |
560 | s->internal->init_num = 0; | 560 | s->internal->init_num = 0; |
561 | break; | 561 | break; |
562 | 562 | ||
@@ -565,7 +565,7 @@ dtls1_accept(SSL *s) | |||
565 | ret = ssl3_send_newsession_ticket(s); | 565 | ret = ssl3_send_newsession_ticket(s); |
566 | if (ret <= 0) | 566 | if (ret <= 0) |
567 | goto end; | 567 | goto end; |
568 | s->state = SSL3_ST_SW_CHANGE_A; | 568 | s->internal->state = SSL3_ST_SW_CHANGE_A; |
569 | s->internal->init_num = 0; | 569 | s->internal->init_num = 0; |
570 | break; | 570 | break; |
571 | 571 | ||
@@ -574,7 +574,7 @@ dtls1_accept(SSL *s) | |||
574 | ret = ssl3_send_cert_status(s); | 574 | ret = ssl3_send_cert_status(s); |
575 | if (ret <= 0) | 575 | if (ret <= 0) |
576 | goto end; | 576 | goto end; |
577 | s->state = SSL3_ST_SW_KEY_EXCH_A; | 577 | s->internal->state = SSL3_ST_SW_KEY_EXCH_A; |
578 | s->internal->init_num = 0; | 578 | s->internal->init_num = 0; |
579 | break; | 579 | break; |
580 | 580 | ||
@@ -595,7 +595,7 @@ dtls1_accept(SSL *s) | |||
595 | goto end; | 595 | goto end; |
596 | 596 | ||
597 | 597 | ||
598 | s->state = SSL3_ST_SW_FINISHED_A; | 598 | s->internal->state = SSL3_ST_SW_FINISHED_A; |
599 | s->internal->init_num = 0; | 599 | s->internal->init_num = 0; |
600 | 600 | ||
601 | if (!s->method->ssl3_enc->change_cipher_state(s, | 601 | if (!s->method->ssl3_enc->change_cipher_state(s, |
@@ -615,7 +615,7 @@ dtls1_accept(SSL *s) | |||
615 | s->method->ssl3_enc->server_finished_label_len); | 615 | s->method->ssl3_enc->server_finished_label_len); |
616 | if (ret <= 0) | 616 | if (ret <= 0) |
617 | goto end; | 617 | goto end; |
618 | s->state = SSL3_ST_SW_FLUSH; | 618 | s->internal->state = SSL3_ST_SW_FLUSH; |
619 | if (s->internal->hit) { | 619 | if (s->internal->hit) { |
620 | S3I(s)->tmp.next_state = SSL3_ST_SR_FINISHED_A; | 620 | S3I(s)->tmp.next_state = SSL3_ST_SR_FINISHED_A; |
621 | 621 | ||
@@ -672,11 +672,11 @@ dtls1_accept(SSL *s) | |||
672 | goto end; | 672 | goto end; |
673 | } | 673 | } |
674 | 674 | ||
675 | if ((cb != NULL) && (s->state != state)) { | 675 | if ((cb != NULL) && (s->internal->state != state)) { |
676 | new_state = s->state; | 676 | new_state = s->internal->state; |
677 | s->state = state; | 677 | s->internal->state = state; |
678 | cb(s, SSL_CB_ACCEPT_LOOP, 1); | 678 | cb(s, SSL_CB_ACCEPT_LOOP, 1); |
679 | s->state = new_state; | 679 | s->internal->state = new_state; |
680 | } | 680 | } |
681 | } | 681 | } |
682 | skip = 0; | 682 | skip = 0; |
@@ -697,7 +697,7 @@ dtls1_send_hello_verify_request(SSL *s) | |||
697 | { | 697 | { |
698 | unsigned char *d, *p; | 698 | unsigned char *d, *p; |
699 | 699 | ||
700 | if (s->state == DTLS1_ST_SW_HELLO_VERIFY_REQUEST_A) { | 700 | if (s->internal->state == DTLS1_ST_SW_HELLO_VERIFY_REQUEST_A) { |
701 | d = p = ssl3_handshake_msg_start(s, | 701 | d = p = ssl3_handshake_msg_start(s, |
702 | DTLS1_MT_HELLO_VERIFY_REQUEST); | 702 | DTLS1_MT_HELLO_VERIFY_REQUEST); |
703 | 703 | ||
@@ -718,9 +718,9 @@ dtls1_send_hello_verify_request(SSL *s) | |||
718 | 718 | ||
719 | ssl3_handshake_msg_finish(s, p - d); | 719 | ssl3_handshake_msg_finish(s, p - d); |
720 | 720 | ||
721 | s->state = DTLS1_ST_SW_HELLO_VERIFY_REQUEST_B; | 721 | s->internal->state = DTLS1_ST_SW_HELLO_VERIFY_REQUEST_B; |
722 | } | 722 | } |
723 | 723 | ||
724 | /* s->state = DTLS1_ST_SW_HELLO_VERIFY_REQUEST_B */ | 724 | /* s->internal->state = DTLS1_ST_SW_HELLO_VERIFY_REQUEST_B */ |
725 | return (ssl3_handshake_write(s)); | 725 | return (ssl3_handshake_write(s)); |
726 | } | 726 | } |
diff --git a/src/lib/libssl/s23_clnt.c b/src/lib/libssl/s23_clnt.c index e95006bcca..ccaee02564 100644 --- a/src/lib/libssl/s23_clnt.c +++ b/src/lib/libssl/s23_clnt.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s23_clnt.c,v 1.53 2017/01/23 06:45:30 beck Exp $ */ | 1 | /* $OpenBSD: s23_clnt.c,v 1.54 2017/01/23 08:48:44 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -140,9 +140,9 @@ ssl23_connect(SSL *s) | |||
140 | SSL_clear(s); | 140 | SSL_clear(s); |
141 | 141 | ||
142 | for (;;) { | 142 | for (;;) { |
143 | state = s->state; | 143 | state = s->internal->state; |
144 | 144 | ||
145 | switch (s->state) { | 145 | switch (s->internal->state) { |
146 | case SSL_ST_BEFORE: | 146 | case SSL_ST_BEFORE: |
147 | case SSL_ST_CONNECT: | 147 | case SSL_ST_CONNECT: |
148 | case SSL_ST_BEFORE|SSL_ST_CONNECT: | 148 | case SSL_ST_BEFORE|SSL_ST_CONNECT: |
@@ -173,7 +173,7 @@ ssl23_connect(SSL *s) | |||
173 | goto end; | 173 | goto end; |
174 | } | 174 | } |
175 | 175 | ||
176 | s->state = SSL23_ST_CW_CLNT_HELLO_A; | 176 | s->internal->state = SSL23_ST_CW_CLNT_HELLO_A; |
177 | s->ctx->internal->stats.sess_connect++; | 177 | s->ctx->internal->stats.sess_connect++; |
178 | s->internal->init_num = 0; | 178 | s->internal->init_num = 0; |
179 | break; | 179 | break; |
@@ -185,7 +185,7 @@ ssl23_connect(SSL *s) | |||
185 | ret = ssl23_client_hello(s); | 185 | ret = ssl23_client_hello(s); |
186 | if (ret <= 0) | 186 | if (ret <= 0) |
187 | goto end; | 187 | goto end; |
188 | s->state = SSL23_ST_CR_SRVR_HELLO_A; | 188 | s->internal->state = SSL23_ST_CR_SRVR_HELLO_A; |
189 | s->internal->init_num = 0; | 189 | s->internal->init_num = 0; |
190 | 190 | ||
191 | break; | 191 | break; |
@@ -209,11 +209,11 @@ ssl23_connect(SSL *s) | |||
209 | (void)BIO_flush(s->wbio); | 209 | (void)BIO_flush(s->wbio); |
210 | } | 210 | } |
211 | 211 | ||
212 | if ((cb != NULL) && (s->state != state)) { | 212 | if ((cb != NULL) && (s->internal->state != state)) { |
213 | new_state = s->state; | 213 | new_state = s->internal->state; |
214 | s->state = state; | 214 | s->internal->state = state; |
215 | cb(s, SSL_CB_CONNECT_LOOP, 1); | 215 | cb(s, SSL_CB_CONNECT_LOOP, 1); |
216 | s->state = new_state; | 216 | s->internal->state = new_state; |
217 | } | 217 | } |
218 | } | 218 | } |
219 | 219 | ||
@@ -236,7 +236,7 @@ ssl23_client_hello(SSL *s) | |||
236 | int ret; | 236 | int ret; |
237 | 237 | ||
238 | buf = (unsigned char *)s->internal->init_buf->data; | 238 | buf = (unsigned char *)s->internal->init_buf->data; |
239 | if (s->state == SSL23_ST_CW_CLNT_HELLO_A) { | 239 | if (s->internal->state == SSL23_ST_CW_CLNT_HELLO_A) { |
240 | arc4random_buf(s->s3->client_random, SSL3_RANDOM_SIZE); | 240 | arc4random_buf(s->s3->client_random, SSL3_RANDOM_SIZE); |
241 | 241 | ||
242 | if (ssl_enabled_version_range(s, NULL, &version) != 1) { | 242 | if (ssl_enabled_version_range(s, NULL, &version) != 1) { |
@@ -325,7 +325,7 @@ ssl23_client_hello(SSL *s) | |||
325 | tls1_finish_mac(s, &(buf[SSL3_RT_HEADER_LENGTH]), | 325 | tls1_finish_mac(s, &(buf[SSL3_RT_HEADER_LENGTH]), |
326 | s->internal->init_num - SSL3_RT_HEADER_LENGTH); | 326 | s->internal->init_num - SSL3_RT_HEADER_LENGTH); |
327 | 327 | ||
328 | s->state = SSL23_ST_CW_CLNT_HELLO_B; | 328 | s->internal->state = SSL23_ST_CW_CLNT_HELLO_B; |
329 | s->internal->init_off = 0; | 329 | s->internal->init_off = 0; |
330 | } | 330 | } |
331 | 331 | ||
@@ -419,11 +419,11 @@ ssl23_get_server_hello(SSL *s) | |||
419 | goto err; | 419 | goto err; |
420 | 420 | ||
421 | /* we are in this state */ | 421 | /* we are in this state */ |
422 | s->state = SSL3_ST_CR_SRVR_HELLO_A; | 422 | s->internal->state = SSL3_ST_CR_SRVR_HELLO_A; |
423 | 423 | ||
424 | /* put the 7 bytes we have read into the input buffer | 424 | /* put the 7 bytes we have read into the input buffer |
425 | * for SSLv3 */ | 425 | * for SSLv3 */ |
426 | s->rstate = SSL_ST_READ_HEADER; | 426 | s->internal->rstate = SSL_ST_READ_HEADER; |
427 | s->internal->packet_length = n; | 427 | s->internal->packet_length = n; |
428 | if (s->s3->rbuf.buf == NULL) | 428 | if (s->s3->rbuf.buf == NULL) |
429 | if (!ssl3_setup_read_buffer(s)) | 429 | if (!ssl3_setup_read_buffer(s)) |
diff --git a/src/lib/libssl/s23_srvr.c b/src/lib/libssl/s23_srvr.c index 6b5ac0cc63..4dd94eb7b8 100644 --- a/src/lib/libssl/s23_srvr.c +++ b/src/lib/libssl/s23_srvr.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s23_srvr.c,v 1.54 2017/01/23 06:45:30 beck Exp $ */ | 1 | /* $OpenBSD: s23_srvr.c,v 1.55 2017/01/23 08:48:44 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -139,9 +139,9 @@ ssl23_accept(SSL *s) | |||
139 | SSL_clear(s); | 139 | SSL_clear(s); |
140 | 140 | ||
141 | for (;;) { | 141 | for (;;) { |
142 | state = s->state; | 142 | state = s->internal->state; |
143 | 143 | ||
144 | switch (s->state) { | 144 | switch (s->internal->state) { |
145 | case SSL_ST_BEFORE: | 145 | case SSL_ST_BEFORE: |
146 | case SSL_ST_ACCEPT: | 146 | case SSL_ST_ACCEPT: |
147 | case SSL_ST_BEFORE|SSL_ST_ACCEPT: | 147 | case SSL_ST_BEFORE|SSL_ST_ACCEPT: |
@@ -163,7 +163,7 @@ ssl23_accept(SSL *s) | |||
163 | goto end; | 163 | goto end; |
164 | } | 164 | } |
165 | 165 | ||
166 | s->state = SSL23_ST_SR_CLNT_HELLO_A; | 166 | s->internal->state = SSL23_ST_SR_CLNT_HELLO_A; |
167 | s->ctx->internal->stats.sess_accept++; | 167 | s->ctx->internal->stats.sess_accept++; |
168 | s->internal->init_num = 0; | 168 | s->internal->init_num = 0; |
169 | break; | 169 | break; |
@@ -185,11 +185,11 @@ ssl23_accept(SSL *s) | |||
185 | /* break; */ | 185 | /* break; */ |
186 | } | 186 | } |
187 | 187 | ||
188 | if ((cb != NULL) && (s->state != state)) { | 188 | if ((cb != NULL) && (s->internal->state != state)) { |
189 | new_state = s->state; | 189 | new_state = s->internal->state; |
190 | s->state = state; | 190 | s->internal->state = state; |
191 | cb(s, SSL_CB_ACCEPT_LOOP, 1); | 191 | cb(s, SSL_CB_ACCEPT_LOOP, 1); |
192 | s->state = new_state; | 192 | s->internal->state = new_state; |
193 | } | 193 | } |
194 | } | 194 | } |
195 | 195 | ||
@@ -228,7 +228,7 @@ ssl23_get_client_hello(SSL *s) | |||
228 | int n = 0, j; | 228 | int n = 0, j; |
229 | int type = 0; | 229 | int type = 0; |
230 | 230 | ||
231 | if (s->state == SSL23_ST_SR_CLNT_HELLO_A) { | 231 | if (s->internal->state == SSL23_ST_SR_CLNT_HELLO_A) { |
232 | /* read the initial header */ | 232 | /* read the initial header */ |
233 | if (!ssl3_setup_buffers(s)) | 233 | if (!ssl3_setup_buffers(s)) |
234 | return -1; | 234 | return -1; |
@@ -252,7 +252,7 @@ ssl23_get_client_hello(SSL *s) | |||
252 | goto unsupported; | 252 | goto unsupported; |
253 | 253 | ||
254 | s->version = shared_version; | 254 | s->version = shared_version; |
255 | s->state = SSL23_ST_SR_CLNT_HELLO_B; | 255 | s->internal->state = SSL23_ST_SR_CLNT_HELLO_B; |
256 | } else if ((p[0] == SSL3_RT_HANDSHAKE) && | 256 | } else if ((p[0] == SSL3_RT_HANDSHAKE) && |
257 | (p[1] == SSL3_VERSION_MAJOR) && | 257 | (p[1] == SSL3_VERSION_MAJOR) && |
258 | (p[5] == SSL3_MT_CLIENT_HELLO) && | 258 | (p[5] == SSL3_MT_CLIENT_HELLO) && |
@@ -301,7 +301,7 @@ ssl23_get_client_hello(SSL *s) | |||
301 | } | 301 | } |
302 | } | 302 | } |
303 | 303 | ||
304 | if (s->state == SSL23_ST_SR_CLNT_HELLO_B) { | 304 | if (s->internal->state == SSL23_ST_SR_CLNT_HELLO_B) { |
305 | /* we have SSLv3/TLSv1 in an SSLv2 header | 305 | /* we have SSLv3/TLSv1 in an SSLv2 header |
306 | * (other cases skip this state) */ | 306 | * (other cases skip this state) */ |
307 | 307 | ||
@@ -413,7 +413,7 @@ ssl23_get_client_hello(SSL *s) | |||
413 | } | 413 | } |
414 | 414 | ||
415 | /* imaginary new state (for program structure): */ | 415 | /* imaginary new state (for program structure): */ |
416 | /* s->state = SSL23_SR_CLNT_HELLO_C */ | 416 | /* s->internal->state = SSL23_SR_CLNT_HELLO_C */ |
417 | 417 | ||
418 | if (type == 2 || type == 3) { | 418 | if (type == 2 || type == 3) { |
419 | /* we have SSLv3/TLSv1 (type 2: SSL2 style, type 3: SSL3/TLS style) */ | 419 | /* we have SSLv3/TLSv1 (type 2: SSL2 style, type 3: SSL3/TLS style) */ |
@@ -422,12 +422,12 @@ ssl23_get_client_hello(SSL *s) | |||
422 | return -1; | 422 | return -1; |
423 | 423 | ||
424 | /* we are in this state */ | 424 | /* we are in this state */ |
425 | s->state = SSL3_ST_SR_CLNT_HELLO_A; | 425 | s->internal->state = SSL3_ST_SR_CLNT_HELLO_A; |
426 | 426 | ||
427 | if (type == 3) { | 427 | if (type == 3) { |
428 | /* put the 'n' bytes we have read into the input buffer | 428 | /* put the 'n' bytes we have read into the input buffer |
429 | * for SSLv3 */ | 429 | * for SSLv3 */ |
430 | s->rstate = SSL_ST_READ_HEADER; | 430 | s->internal->rstate = SSL_ST_READ_HEADER; |
431 | s->internal->packet_length = n; | 431 | s->internal->packet_length = n; |
432 | if (s->s3->rbuf.buf == NULL) | 432 | if (s->s3->rbuf.buf == NULL) |
433 | if (!ssl3_setup_read_buffer(s)) | 433 | if (!ssl3_setup_read_buffer(s)) |
diff --git a/src/lib/libssl/s3_both.c b/src/lib/libssl/s3_both.c index 12559ab710..23fdcd2065 100644 --- a/src/lib/libssl/s3_both.c +++ b/src/lib/libssl/s3_both.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s3_both.c,v 1.53 2017/01/23 06:45:30 beck Exp $ */ | 1 | /* $OpenBSD: s3_both.c,v 1.54 2017/01/23 08:48:44 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -169,7 +169,7 @@ ssl3_send_finished(SSL *s, int a, int b, const char *sender, int slen) | |||
169 | unsigned char *p; | 169 | unsigned char *p; |
170 | int md_len; | 170 | int md_len; |
171 | 171 | ||
172 | if (s->state == a) { | 172 | if (s->internal->state == a) { |
173 | md_len = s->method->ssl3_enc->finish_mac_length; | 173 | md_len = s->method->ssl3_enc->finish_mac_length; |
174 | OPENSSL_assert(md_len <= EVP_MAX_MD_SIZE); | 174 | OPENSSL_assert(md_len <= EVP_MAX_MD_SIZE); |
175 | 175 | ||
@@ -193,7 +193,7 @@ ssl3_send_finished(SSL *s, int a, int b, const char *sender, int slen) | |||
193 | memcpy(p, S3I(s)->tmp.finish_md, md_len); | 193 | memcpy(p, S3I(s)->tmp.finish_md, md_len); |
194 | ssl3_handshake_msg_finish(s, md_len); | 194 | ssl3_handshake_msg_finish(s, md_len); |
195 | 195 | ||
196 | s->state = b; | 196 | s->internal->state = b; |
197 | } | 197 | } |
198 | 198 | ||
199 | return (ssl3_handshake_write(s)); | 199 | return (ssl3_handshake_write(s)); |
@@ -216,7 +216,7 @@ ssl3_take_mac(SSL *s) | |||
216 | if (S3I(s)->tmp.new_cipher == NULL) | 216 | if (S3I(s)->tmp.new_cipher == NULL) |
217 | return; | 217 | return; |
218 | 218 | ||
219 | if (s->state & SSL_ST_CONNECT) { | 219 | if (s->internal->state & SSL_ST_CONNECT) { |
220 | sender = s->method->ssl3_enc->server_finished_label; | 220 | sender = s->method->ssl3_enc->server_finished_label; |
221 | slen = s->method->ssl3_enc->server_finished_label_len; | 221 | slen = s->method->ssl3_enc->server_finished_label_len; |
222 | } else { | 222 | } else { |
@@ -302,13 +302,13 @@ ssl3_send_change_cipher_spec(SSL *s, int a, int b) | |||
302 | { | 302 | { |
303 | unsigned char *p; | 303 | unsigned char *p; |
304 | 304 | ||
305 | if (s->state == a) { | 305 | if (s->internal->state == a) { |
306 | p = (unsigned char *)s->internal->init_buf->data; | 306 | p = (unsigned char *)s->internal->init_buf->data; |
307 | *p = SSL3_MT_CCS; | 307 | *p = SSL3_MT_CCS; |
308 | s->internal->init_num = 1; | 308 | s->internal->init_num = 1; |
309 | s->internal->init_off = 0; | 309 | s->internal->init_off = 0; |
310 | 310 | ||
311 | s->state = b; | 311 | s->internal->state = b; |
312 | } | 312 | } |
313 | 313 | ||
314 | /* SSL3_ST_CW_CHANGE_B */ | 314 | /* SSL3_ST_CW_CHANGE_B */ |
@@ -433,7 +433,7 @@ ssl3_get_message(SSL *s, int st1, int stn, int mt, long max, int *ok) | |||
433 | p = (unsigned char *)s->internal->init_buf->data; | 433 | p = (unsigned char *)s->internal->init_buf->data; |
434 | 434 | ||
435 | /* s->internal->init_num < 4 */ | 435 | /* s->internal->init_num < 4 */ |
436 | if (s->state == st1) { | 436 | if (s->internal->state == st1) { |
437 | int skip_message; | 437 | int skip_message; |
438 | 438 | ||
439 | do { | 439 | do { |
@@ -497,7 +497,7 @@ ssl3_get_message(SSL *s, int st1, int stn, int mt, long max, int *ok) | |||
497 | goto err; | 497 | goto err; |
498 | } | 498 | } |
499 | S3I(s)->tmp.message_size = l; | 499 | S3I(s)->tmp.message_size = l; |
500 | s->state = stn; | 500 | s->internal->state = stn; |
501 | 501 | ||
502 | s->internal->init_msg = s->internal->init_buf->data + 4; | 502 | s->internal->init_msg = s->internal->init_buf->data + 4; |
503 | s->internal->init_num = 0; | 503 | s->internal->init_num = 0; |
diff --git a/src/lib/libssl/s3_clnt.c b/src/lib/libssl/s3_clnt.c index 0893682e75..a6feb68e91 100644 --- a/src/lib/libssl/s3_clnt.c +++ b/src/lib/libssl/s3_clnt.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s3_clnt.c,v 1.168 2017/01/23 06:45:30 beck Exp $ */ | 1 | /* $OpenBSD: s3_clnt.c,v 1.169 2017/01/23 08:48:44 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -193,12 +193,12 @@ ssl3_connect(SSL *s) | |||
193 | SSL_clear(s); | 193 | SSL_clear(s); |
194 | 194 | ||
195 | for (;;) { | 195 | for (;;) { |
196 | state = s->state; | 196 | state = s->internal->state; |
197 | 197 | ||
198 | switch (s->state) { | 198 | switch (s->internal->state) { |
199 | case SSL_ST_RENEGOTIATE: | 199 | case SSL_ST_RENEGOTIATE: |
200 | s->internal->renegotiate = 1; | 200 | s->internal->renegotiate = 1; |
201 | s->state = SSL_ST_CONNECT; | 201 | s->internal->state = SSL_ST_CONNECT; |
202 | s->ctx->internal->stats.sess_connect_renegotiate++; | 202 | s->ctx->internal->stats.sess_connect_renegotiate++; |
203 | /* break */ | 203 | /* break */ |
204 | case SSL_ST_BEFORE: | 204 | case SSL_ST_BEFORE: |
@@ -240,7 +240,7 @@ ssl3_connect(SSL *s) | |||
240 | goto end; | 240 | goto end; |
241 | } | 241 | } |
242 | 242 | ||
243 | s->state = SSL3_ST_CW_CLNT_HELLO_A; | 243 | s->internal->state = SSL3_ST_CW_CLNT_HELLO_A; |
244 | s->ctx->internal->stats.sess_connect++; | 244 | s->ctx->internal->stats.sess_connect++; |
245 | s->internal->init_num = 0; | 245 | s->internal->init_num = 0; |
246 | break; | 246 | break; |
@@ -252,7 +252,7 @@ ssl3_connect(SSL *s) | |||
252 | ret = ssl3_client_hello(s); | 252 | ret = ssl3_client_hello(s); |
253 | if (ret <= 0) | 253 | if (ret <= 0) |
254 | goto end; | 254 | goto end; |
255 | s->state = SSL3_ST_CR_SRVR_HELLO_A; | 255 | s->internal->state = SSL3_ST_CR_SRVR_HELLO_A; |
256 | s->internal->init_num = 0; | 256 | s->internal->init_num = 0; |
257 | 257 | ||
258 | /* turn on buffering for the next lot of output */ | 258 | /* turn on buffering for the next lot of output */ |
@@ -268,13 +268,13 @@ ssl3_connect(SSL *s) | |||
268 | goto end; | 268 | goto end; |
269 | 269 | ||
270 | if (s->internal->hit) { | 270 | if (s->internal->hit) { |
271 | s->state = SSL3_ST_CR_FINISHED_A; | 271 | s->internal->state = SSL3_ST_CR_FINISHED_A; |
272 | if (s->internal->tlsext_ticket_expected) { | 272 | if (s->internal->tlsext_ticket_expected) { |
273 | /* receive renewed session ticket */ | 273 | /* receive renewed session ticket */ |
274 | s->state = SSL3_ST_CR_SESSION_TICKET_A; | 274 | s->internal->state = SSL3_ST_CR_SESSION_TICKET_A; |
275 | } | 275 | } |
276 | } else | 276 | } else |
277 | s->state = SSL3_ST_CR_CERT_A; | 277 | s->internal->state = SSL3_ST_CR_CERT_A; |
278 | s->internal->init_num = 0; | 278 | s->internal->init_num = 0; |
279 | break; | 279 | break; |
280 | 280 | ||
@@ -286,9 +286,9 @@ ssl3_connect(SSL *s) | |||
286 | if (ret == 2) { | 286 | if (ret == 2) { |
287 | s->internal->hit = 1; | 287 | s->internal->hit = 1; |
288 | if (s->internal->tlsext_ticket_expected) | 288 | if (s->internal->tlsext_ticket_expected) |
289 | s->state = SSL3_ST_CR_SESSION_TICKET_A; | 289 | s->internal->state = SSL3_ST_CR_SESSION_TICKET_A; |
290 | else | 290 | else |
291 | s->state = SSL3_ST_CR_FINISHED_A; | 291 | s->internal->state = SSL3_ST_CR_FINISHED_A; |
292 | s->internal->init_num = 0; | 292 | s->internal->init_num = 0; |
293 | break; | 293 | break; |
294 | } | 294 | } |
@@ -299,12 +299,12 @@ ssl3_connect(SSL *s) | |||
299 | if (ret <= 0) | 299 | if (ret <= 0) |
300 | goto end; | 300 | goto end; |
301 | if (s->internal->tlsext_status_expected) | 301 | if (s->internal->tlsext_status_expected) |
302 | s->state = SSL3_ST_CR_CERT_STATUS_A; | 302 | s->internal->state = SSL3_ST_CR_CERT_STATUS_A; |
303 | else | 303 | else |
304 | s->state = SSL3_ST_CR_KEY_EXCH_A; | 304 | s->internal->state = SSL3_ST_CR_KEY_EXCH_A; |
305 | } else { | 305 | } else { |
306 | skip = 1; | 306 | skip = 1; |
307 | s->state = SSL3_ST_CR_KEY_EXCH_A; | 307 | s->internal->state = SSL3_ST_CR_KEY_EXCH_A; |
308 | } | 308 | } |
309 | s->internal->init_num = 0; | 309 | s->internal->init_num = 0; |
310 | break; | 310 | break; |
@@ -314,7 +314,7 @@ ssl3_connect(SSL *s) | |||
314 | ret = ssl3_get_server_key_exchange(s); | 314 | ret = ssl3_get_server_key_exchange(s); |
315 | if (ret <= 0) | 315 | if (ret <= 0) |
316 | goto end; | 316 | goto end; |
317 | s->state = SSL3_ST_CR_CERT_REQ_A; | 317 | s->internal->state = SSL3_ST_CR_CERT_REQ_A; |
318 | s->internal->init_num = 0; | 318 | s->internal->init_num = 0; |
319 | 319 | ||
320 | /* | 320 | /* |
@@ -332,7 +332,7 @@ ssl3_connect(SSL *s) | |||
332 | ret = ssl3_get_certificate_request(s); | 332 | ret = ssl3_get_certificate_request(s); |
333 | if (ret <= 0) | 333 | if (ret <= 0) |
334 | goto end; | 334 | goto end; |
335 | s->state = SSL3_ST_CR_SRVR_DONE_A; | 335 | s->internal->state = SSL3_ST_CR_SRVR_DONE_A; |
336 | s->internal->init_num = 0; | 336 | s->internal->init_num = 0; |
337 | break; | 337 | break; |
338 | 338 | ||
@@ -342,9 +342,9 @@ ssl3_connect(SSL *s) | |||
342 | if (ret <= 0) | 342 | if (ret <= 0) |
343 | goto end; | 343 | goto end; |
344 | if (S3I(s)->tmp.cert_req) | 344 | if (S3I(s)->tmp.cert_req) |
345 | s->state = SSL3_ST_CW_CERT_A; | 345 | s->internal->state = SSL3_ST_CW_CERT_A; |
346 | else | 346 | else |
347 | s->state = SSL3_ST_CW_KEY_EXCH_A; | 347 | s->internal->state = SSL3_ST_CW_KEY_EXCH_A; |
348 | s->internal->init_num = 0; | 348 | s->internal->init_num = 0; |
349 | 349 | ||
350 | break; | 350 | break; |
@@ -356,7 +356,7 @@ ssl3_connect(SSL *s) | |||
356 | ret = ssl3_send_client_certificate(s); | 356 | ret = ssl3_send_client_certificate(s); |
357 | if (ret <= 0) | 357 | if (ret <= 0) |
358 | goto end; | 358 | goto end; |
359 | s->state = SSL3_ST_CW_KEY_EXCH_A; | 359 | s->internal->state = SSL3_ST_CW_KEY_EXCH_A; |
360 | s->internal->init_num = 0; | 360 | s->internal->init_num = 0; |
361 | break; | 361 | break; |
362 | 362 | ||
@@ -382,13 +382,13 @@ ssl3_connect(SSL *s) | |||
382 | * inside the client certificate. | 382 | * inside the client certificate. |
383 | */ | 383 | */ |
384 | if (S3I(s)->tmp.cert_req == 1) { | 384 | if (S3I(s)->tmp.cert_req == 1) { |
385 | s->state = SSL3_ST_CW_CERT_VRFY_A; | 385 | s->internal->state = SSL3_ST_CW_CERT_VRFY_A; |
386 | } else { | 386 | } else { |
387 | s->state = SSL3_ST_CW_CHANGE_A; | 387 | s->internal->state = SSL3_ST_CW_CHANGE_A; |
388 | S3I(s)->change_cipher_spec = 0; | 388 | S3I(s)->change_cipher_spec = 0; |
389 | } | 389 | } |
390 | if (s->s3->flags & TLS1_FLAGS_SKIP_CERT_VERIFY) { | 390 | if (s->s3->flags & TLS1_FLAGS_SKIP_CERT_VERIFY) { |
391 | s->state = SSL3_ST_CW_CHANGE_A; | 391 | s->internal->state = SSL3_ST_CW_CHANGE_A; |
392 | S3I(s)->change_cipher_spec = 0; | 392 | S3I(s)->change_cipher_spec = 0; |
393 | } | 393 | } |
394 | 394 | ||
@@ -400,7 +400,7 @@ ssl3_connect(SSL *s) | |||
400 | ret = ssl3_send_client_verify(s); | 400 | ret = ssl3_send_client_verify(s); |
401 | if (ret <= 0) | 401 | if (ret <= 0) |
402 | goto end; | 402 | goto end; |
403 | s->state = SSL3_ST_CW_CHANGE_A; | 403 | s->internal->state = SSL3_ST_CW_CHANGE_A; |
404 | s->internal->init_num = 0; | 404 | s->internal->init_num = 0; |
405 | S3I(s)->change_cipher_spec = 0; | 405 | S3I(s)->change_cipher_spec = 0; |
406 | break; | 406 | break; |
@@ -413,9 +413,9 @@ ssl3_connect(SSL *s) | |||
413 | goto end; | 413 | goto end; |
414 | 414 | ||
415 | if (S3I(s)->next_proto_neg_seen) | 415 | if (S3I(s)->next_proto_neg_seen) |
416 | s->state = SSL3_ST_CW_NEXT_PROTO_A; | 416 | s->internal->state = SSL3_ST_CW_NEXT_PROTO_A; |
417 | else | 417 | else |
418 | s->state = SSL3_ST_CW_FINISHED_A; | 418 | s->internal->state = SSL3_ST_CW_FINISHED_A; |
419 | s->internal->init_num = 0; | 419 | s->internal->init_num = 0; |
420 | 420 | ||
421 | s->session->cipher = S3I(s)->tmp.new_cipher; | 421 | s->session->cipher = S3I(s)->tmp.new_cipher; |
@@ -437,7 +437,7 @@ ssl3_connect(SSL *s) | |||
437 | ret = ssl3_send_next_proto(s); | 437 | ret = ssl3_send_next_proto(s); |
438 | if (ret <= 0) | 438 | if (ret <= 0) |
439 | goto end; | 439 | goto end; |
440 | s->state = SSL3_ST_CW_FINISHED_A; | 440 | s->internal->state = SSL3_ST_CW_FINISHED_A; |
441 | break; | 441 | break; |
442 | 442 | ||
443 | case SSL3_ST_CW_FINISHED_A: | 443 | case SSL3_ST_CW_FINISHED_A: |
@@ -449,7 +449,7 @@ ssl3_connect(SSL *s) | |||
449 | if (ret <= 0) | 449 | if (ret <= 0) |
450 | goto end; | 450 | goto end; |
451 | s->s3->flags |= SSL3_FLAGS_CCS_OK; | 451 | s->s3->flags |= SSL3_FLAGS_CCS_OK; |
452 | s->state = SSL3_ST_CW_FLUSH; | 452 | s->internal->state = SSL3_ST_CW_FLUSH; |
453 | 453 | ||
454 | /* clear flags */ | 454 | /* clear flags */ |
455 | s->s3->flags &= ~SSL3_FLAGS_POP_BUFFER; | 455 | s->s3->flags &= ~SSL3_FLAGS_POP_BUFFER; |
@@ -457,7 +457,7 @@ ssl3_connect(SSL *s) | |||
457 | S3I(s)->tmp.next_state = SSL_ST_OK; | 457 | S3I(s)->tmp.next_state = SSL_ST_OK; |
458 | if (s->s3->flags & | 458 | if (s->s3->flags & |
459 | SSL3_FLAGS_DELAY_CLIENT_FINISHED) { | 459 | SSL3_FLAGS_DELAY_CLIENT_FINISHED) { |
460 | s->state = SSL_ST_OK; | 460 | s->internal->state = SSL_ST_OK; |
461 | s->s3->flags|=SSL3_FLAGS_POP_BUFFER; | 461 | s->s3->flags|=SSL3_FLAGS_POP_BUFFER; |
462 | S3I(s)->delay_buf_pop_ret = 0; | 462 | S3I(s)->delay_buf_pop_ret = 0; |
463 | } | 463 | } |
@@ -478,7 +478,7 @@ ssl3_connect(SSL *s) | |||
478 | ret = ssl3_get_new_session_ticket(s); | 478 | ret = ssl3_get_new_session_ticket(s); |
479 | if (ret <= 0) | 479 | if (ret <= 0) |
480 | goto end; | 480 | goto end; |
481 | s->state = SSL3_ST_CR_FINISHED_A; | 481 | s->internal->state = SSL3_ST_CR_FINISHED_A; |
482 | s->internal->init_num = 0; | 482 | s->internal->init_num = 0; |
483 | break; | 483 | break; |
484 | 484 | ||
@@ -487,7 +487,7 @@ ssl3_connect(SSL *s) | |||
487 | ret = ssl3_get_cert_status(s); | 487 | ret = ssl3_get_cert_status(s); |
488 | if (ret <= 0) | 488 | if (ret <= 0) |
489 | goto end; | 489 | goto end; |
490 | s->state = SSL3_ST_CR_KEY_EXCH_A; | 490 | s->internal->state = SSL3_ST_CR_KEY_EXCH_A; |
491 | s->internal->init_num = 0; | 491 | s->internal->init_num = 0; |
492 | break; | 492 | break; |
493 | 493 | ||
@@ -500,9 +500,9 @@ ssl3_connect(SSL *s) | |||
500 | goto end; | 500 | goto end; |
501 | 501 | ||
502 | if (s->internal->hit) | 502 | if (s->internal->hit) |
503 | s->state = SSL3_ST_CW_CHANGE_A; | 503 | s->internal->state = SSL3_ST_CW_CHANGE_A; |
504 | else | 504 | else |
505 | s->state = SSL_ST_OK; | 505 | s->internal->state = SSL_ST_OK; |
506 | s->internal->init_num = 0; | 506 | s->internal->init_num = 0; |
507 | break; | 507 | break; |
508 | 508 | ||
@@ -513,7 +513,7 @@ ssl3_connect(SSL *s) | |||
513 | goto end; | 513 | goto end; |
514 | } | 514 | } |
515 | s->internal->rwstate = SSL_NOTHING; | 515 | s->internal->rwstate = SSL_NOTHING; |
516 | s->state = S3I(s)->tmp.next_state; | 516 | s->internal->state = S3I(s)->tmp.next_state; |
517 | break; | 517 | break; |
518 | 518 | ||
519 | case SSL_ST_OK: | 519 | case SSL_ST_OK: |
@@ -567,11 +567,11 @@ ssl3_connect(SSL *s) | |||
567 | goto end; | 567 | goto end; |
568 | } | 568 | } |
569 | 569 | ||
570 | if ((cb != NULL) && (s->state != state)) { | 570 | if ((cb != NULL) && (s->internal->state != state)) { |
571 | new_state = s->state; | 571 | new_state = s->internal->state; |
572 | s->state = state; | 572 | s->internal->state = state; |
573 | cb(s, SSL_CB_CONNECT_LOOP, 1); | 573 | cb(s, SSL_CB_CONNECT_LOOP, 1); |
574 | s->state = new_state; | 574 | s->internal->state = new_state; |
575 | } | 575 | } |
576 | } | 576 | } |
577 | skip = 0; | 577 | skip = 0; |
@@ -594,7 +594,7 @@ ssl3_client_hello(SSL *s) | |||
594 | 594 | ||
595 | bufend = (unsigned char *)s->internal->init_buf->data + SSL3_RT_MAX_PLAIN_LENGTH; | 595 | bufend = (unsigned char *)s->internal->init_buf->data + SSL3_RT_MAX_PLAIN_LENGTH; |
596 | 596 | ||
597 | if (s->state == SSL3_ST_CW_CLNT_HELLO_A) { | 597 | if (s->internal->state == SSL3_ST_CW_CLNT_HELLO_A) { |
598 | SSL_SESSION *sess = s->session; | 598 | SSL_SESSION *sess = s->session; |
599 | 599 | ||
600 | if ((sess == NULL) || | 600 | if ((sess == NULL) || |
@@ -706,7 +706,7 @@ ssl3_client_hello(SSL *s) | |||
706 | 706 | ||
707 | ssl3_handshake_msg_finish(s, p - d); | 707 | ssl3_handshake_msg_finish(s, p - d); |
708 | 708 | ||
709 | s->state = SSL3_ST_CW_CLNT_HELLO_B; | 709 | s->internal->state = SSL3_ST_CW_CLNT_HELLO_B; |
710 | } | 710 | } |
711 | 711 | ||
712 | /* SSL3_ST_CW_CLNT_HELLO_B */ | 712 | /* SSL3_ST_CW_CLNT_HELLO_B */ |
@@ -2339,7 +2339,7 @@ ssl3_send_client_key_exchange(SSL *s) | |||
2339 | 2339 | ||
2340 | memset(&cbb, 0, sizeof(cbb)); | 2340 | memset(&cbb, 0, sizeof(cbb)); |
2341 | 2341 | ||
2342 | if (s->state == SSL3_ST_CW_KEY_EXCH_A) { | 2342 | if (s->internal->state == SSL3_ST_CW_KEY_EXCH_A) { |
2343 | alg_k = S3I(s)->tmp.new_cipher->algorithm_mkey; | 2343 | alg_k = S3I(s)->tmp.new_cipher->algorithm_mkey; |
2344 | 2344 | ||
2345 | if ((sess_cert = SSI(s)->sess_cert) == NULL) { | 2345 | if ((sess_cert = SSI(s)->sess_cert) == NULL) { |
@@ -2377,7 +2377,7 @@ ssl3_send_client_key_exchange(SSL *s) | |||
2377 | if (!ssl3_handshake_msg_finish_cbb(s, &cbb)) | 2377 | if (!ssl3_handshake_msg_finish_cbb(s, &cbb)) |
2378 | goto err; | 2378 | goto err; |
2379 | 2379 | ||
2380 | s->state = SSL3_ST_CW_KEY_EXCH_B; | 2380 | s->internal->state = SSL3_ST_CW_KEY_EXCH_B; |
2381 | } | 2381 | } |
2382 | 2382 | ||
2383 | /* SSL3_ST_CW_KEY_EXCH_B */ | 2383 | /* SSL3_ST_CW_KEY_EXCH_B */ |
@@ -2403,7 +2403,7 @@ ssl3_send_client_verify(SSL *s) | |||
2403 | 2403 | ||
2404 | EVP_MD_CTX_init(&mctx); | 2404 | EVP_MD_CTX_init(&mctx); |
2405 | 2405 | ||
2406 | if (s->state == SSL3_ST_CW_CERT_VRFY_A) { | 2406 | if (s->internal->state == SSL3_ST_CW_CERT_VRFY_A) { |
2407 | p = ssl3_handshake_msg_start(s, SSL3_MT_CERTIFICATE_VERIFY); | 2407 | p = ssl3_handshake_msg_start(s, SSL3_MT_CERTIFICATE_VERIFY); |
2408 | 2408 | ||
2409 | /* | 2409 | /* |
@@ -2530,7 +2530,7 @@ ssl3_send_client_verify(SSL *s) | |||
2530 | goto err; | 2530 | goto err; |
2531 | } | 2531 | } |
2532 | 2532 | ||
2533 | s->state = SSL3_ST_CW_CERT_VRFY_B; | 2533 | s->internal->state = SSL3_ST_CW_CERT_VRFY_B; |
2534 | 2534 | ||
2535 | ssl3_handshake_msg_finish(s, n); | 2535 | ssl3_handshake_msg_finish(s, n); |
2536 | } | 2536 | } |
@@ -2556,16 +2556,16 @@ ssl3_send_client_certificate(SSL *s) | |||
2556 | 2556 | ||
2557 | memset(&cbb, 0, sizeof(cbb)); | 2557 | memset(&cbb, 0, sizeof(cbb)); |
2558 | 2558 | ||
2559 | if (s->state == SSL3_ST_CW_CERT_A) { | 2559 | if (s->internal->state == SSL3_ST_CW_CERT_A) { |
2560 | if ((s->cert == NULL) || (s->cert->key->x509 == NULL) || | 2560 | if ((s->cert == NULL) || (s->cert->key->x509 == NULL) || |
2561 | (s->cert->key->privatekey == NULL)) | 2561 | (s->cert->key->privatekey == NULL)) |
2562 | s->state = SSL3_ST_CW_CERT_B; | 2562 | s->internal->state = SSL3_ST_CW_CERT_B; |
2563 | else | 2563 | else |
2564 | s->state = SSL3_ST_CW_CERT_C; | 2564 | s->internal->state = SSL3_ST_CW_CERT_C; |
2565 | } | 2565 | } |
2566 | 2566 | ||
2567 | /* We need to get a client cert */ | 2567 | /* We need to get a client cert */ |
2568 | if (s->state == SSL3_ST_CW_CERT_B) { | 2568 | if (s->internal->state == SSL3_ST_CW_CERT_B) { |
2569 | /* | 2569 | /* |
2570 | * If we get an error, we need to | 2570 | * If we get an error, we need to |
2571 | * ssl->rwstate=SSL_X509_LOOKUP; return(-1); | 2571 | * ssl->rwstate=SSL_X509_LOOKUP; return(-1); |
@@ -2578,7 +2578,7 @@ ssl3_send_client_certificate(SSL *s) | |||
2578 | } | 2578 | } |
2579 | s->internal->rwstate = SSL_NOTHING; | 2579 | s->internal->rwstate = SSL_NOTHING; |
2580 | if ((i == 1) && (pkey != NULL) && (x509 != NULL)) { | 2580 | if ((i == 1) && (pkey != NULL) && (x509 != NULL)) { |
2581 | s->state = SSL3_ST_CW_CERT_B; | 2581 | s->internal->state = SSL3_ST_CW_CERT_B; |
2582 | if (!SSL_use_certificate(s, x509) || | 2582 | if (!SSL_use_certificate(s, x509) || |
2583 | !SSL_use_PrivateKey(s, pkey)) | 2583 | !SSL_use_PrivateKey(s, pkey)) |
2584 | i = 0; | 2584 | i = 0; |
@@ -2594,10 +2594,10 @@ ssl3_send_client_certificate(SSL *s) | |||
2594 | S3I(s)->tmp.cert_req = 2; | 2594 | S3I(s)->tmp.cert_req = 2; |
2595 | 2595 | ||
2596 | /* Ok, we have a cert */ | 2596 | /* Ok, we have a cert */ |
2597 | s->state = SSL3_ST_CW_CERT_C; | 2597 | s->internal->state = SSL3_ST_CW_CERT_C; |
2598 | } | 2598 | } |
2599 | 2599 | ||
2600 | if (s->state == SSL3_ST_CW_CERT_C) { | 2600 | if (s->internal->state == SSL3_ST_CW_CERT_C) { |
2601 | if (!ssl3_handshake_msg_start_cbb(s, &cbb, &client_cert, | 2601 | if (!ssl3_handshake_msg_start_cbb(s, &cbb, &client_cert, |
2602 | SSL3_MT_CERTIFICATE)) | 2602 | SSL3_MT_CERTIFICATE)) |
2603 | goto err; | 2603 | goto err; |
@@ -2607,7 +2607,7 @@ ssl3_send_client_certificate(SSL *s) | |||
2607 | if (!ssl3_handshake_msg_finish_cbb(s, &cbb)) | 2607 | if (!ssl3_handshake_msg_finish_cbb(s, &cbb)) |
2608 | goto err; | 2608 | goto err; |
2609 | 2609 | ||
2610 | s->state = SSL3_ST_CW_CERT_D; | 2610 | s->internal->state = SSL3_ST_CW_CERT_D; |
2611 | } | 2611 | } |
2612 | 2612 | ||
2613 | /* SSL3_ST_CW_CERT_D */ | 2613 | /* SSL3_ST_CW_CERT_D */ |
@@ -2700,7 +2700,7 @@ ssl3_send_next_proto(SSL *s) | |||
2700 | unsigned int len, padding_len; | 2700 | unsigned int len, padding_len; |
2701 | unsigned char *d, *p; | 2701 | unsigned char *d, *p; |
2702 | 2702 | ||
2703 | if (s->state == SSL3_ST_CW_NEXT_PROTO_A) { | 2703 | if (s->internal->state == SSL3_ST_CW_NEXT_PROTO_A) { |
2704 | d = p = ssl3_handshake_msg_start(s, SSL3_MT_NEXT_PROTO); | 2704 | d = p = ssl3_handshake_msg_start(s, SSL3_MT_NEXT_PROTO); |
2705 | 2705 | ||
2706 | len = s->internal->next_proto_negotiated_len; | 2706 | len = s->internal->next_proto_negotiated_len; |
@@ -2714,7 +2714,7 @@ ssl3_send_next_proto(SSL *s) | |||
2714 | 2714 | ||
2715 | ssl3_handshake_msg_finish(s, p - d); | 2715 | ssl3_handshake_msg_finish(s, p - d); |
2716 | 2716 | ||
2717 | s->state = SSL3_ST_CW_NEXT_PROTO_B; | 2717 | s->internal->state = SSL3_ST_CW_NEXT_PROTO_B; |
2718 | } | 2718 | } |
2719 | 2719 | ||
2720 | return (ssl3_handshake_write(s)); | 2720 | return (ssl3_handshake_write(s)); |
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c index 6774557756..09af18ea95 100644 --- a/src/lib/libssl/s3_lib.c +++ b/src/lib/libssl/s3_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s3_lib.c,v 1.125 2017/01/23 06:45:30 beck Exp $ */ | 1 | /* $OpenBSD: s3_lib.c,v 1.126 2017/01/23 08:48:44 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -1678,7 +1678,7 @@ ssl3_cipher_get_value(const SSL_CIPHER *c) | |||
1678 | int | 1678 | int |
1679 | ssl3_pending(const SSL *s) | 1679 | ssl3_pending(const SSL *s) |
1680 | { | 1680 | { |
1681 | if (s->rstate == SSL_ST_READ_BODY) | 1681 | if (s->internal->rstate == SSL_ST_READ_BODY) |
1682 | return 0; | 1682 | return 0; |
1683 | 1683 | ||
1684 | return (S3I(s)->rrec.type == SSL3_RT_APPLICATION_DATA) ? | 1684 | return (S3I(s)->rrec.type == SSL3_RT_APPLICATION_DATA) ? |
@@ -2505,7 +2505,7 @@ ssl3_shutdown(SSL *s) | |||
2505 | * Don't do anything much if we have not done the handshake or | 2505 | * Don't do anything much if we have not done the handshake or |
2506 | * we don't want to send messages :-) | 2506 | * we don't want to send messages :-) |
2507 | */ | 2507 | */ |
2508 | if ((s->internal->quiet_shutdown) || (s->state == SSL_ST_BEFORE)) { | 2508 | if ((s->internal->quiet_shutdown) || (s->internal->state == SSL_ST_BEFORE)) { |
2509 | s->internal->shutdown = (SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN); | 2509 | s->internal->shutdown = (SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN); |
2510 | return (1); | 2510 | return (1); |
2511 | } | 2511 | } |
@@ -2669,7 +2669,7 @@ ssl3_renegotiate_check(SSL *s) | |||
2669 | * to SSL_ST_ACCEPT. | 2669 | * to SSL_ST_ACCEPT. |
2670 | */ | 2670 | */ |
2671 | /* SSL_ST_ACCEPT */ | 2671 | /* SSL_ST_ACCEPT */ |
2672 | s->state = SSL_ST_RENEGOTIATE; | 2672 | s->internal->state = SSL_ST_RENEGOTIATE; |
2673 | S3I(s)->renegotiate = 0; | 2673 | S3I(s)->renegotiate = 0; |
2674 | S3I(s)->num_renegotiations++; | 2674 | S3I(s)->num_renegotiations++; |
2675 | S3I(s)->total_renegotiations++; | 2675 | S3I(s)->total_renegotiations++; |
diff --git a/src/lib/libssl/s3_pkt.c b/src/lib/libssl/s3_pkt.c index 3fb5168d16..228c5f536c 100644 --- a/src/lib/libssl/s3_pkt.c +++ b/src/lib/libssl/s3_pkt.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s3_pkt.c,v 1.65 2017/01/23 08:08:06 beck Exp $ */ | 1 | /* $OpenBSD: s3_pkt.c,v 1.66 2017/01/23 08:48:44 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -290,7 +290,7 @@ ssl3_get_record(SSL *s) | |||
290 | 290 | ||
291 | again: | 291 | again: |
292 | /* check if we have the header */ | 292 | /* check if we have the header */ |
293 | if ((s->rstate != SSL_ST_READ_BODY) || | 293 | if ((s->internal->rstate != SSL_ST_READ_BODY) || |
294 | (s->internal->packet_length < SSL3_RT_HEADER_LENGTH)) { | 294 | (s->internal->packet_length < SSL3_RT_HEADER_LENGTH)) { |
295 | CBS header; | 295 | CBS header; |
296 | uint16_t len, ssl_version; | 296 | uint16_t len, ssl_version; |
@@ -299,7 +299,7 @@ again: | |||
299 | n = ssl3_read_n(s, SSL3_RT_HEADER_LENGTH, s->s3->rbuf.len, 0); | 299 | n = ssl3_read_n(s, SSL3_RT_HEADER_LENGTH, s->s3->rbuf.len, 0); |
300 | if (n <= 0) | 300 | if (n <= 0) |
301 | return(n); /* error or non-blocking */ | 301 | return(n); /* error or non-blocking */ |
302 | s->rstate = SSL_ST_READ_BODY; | 302 | s->internal->rstate = SSL_ST_READ_BODY; |
303 | 303 | ||
304 | CBS_init(&header, s->internal->packet, n); | 304 | CBS_init(&header, s->internal->packet, n); |
305 | 305 | ||
@@ -340,10 +340,10 @@ again: | |||
340 | goto f_err; | 340 | goto f_err; |
341 | } | 341 | } |
342 | 342 | ||
343 | /* now s->rstate == SSL_ST_READ_BODY */ | 343 | /* now s->internal->rstate == SSL_ST_READ_BODY */ |
344 | } | 344 | } |
345 | 345 | ||
346 | /* s->rstate == SSL_ST_READ_BODY, get and decode the data */ | 346 | /* s->internal->rstate == SSL_ST_READ_BODY, get and decode the data */ |
347 | 347 | ||
348 | if (rr->length > s->internal->packet_length - SSL3_RT_HEADER_LENGTH) { | 348 | if (rr->length > s->internal->packet_length - SSL3_RT_HEADER_LENGTH) { |
349 | /* now s->internal->packet_length == SSL3_RT_HEADER_LENGTH */ | 349 | /* now s->internal->packet_length == SSL3_RT_HEADER_LENGTH */ |
@@ -355,7 +355,7 @@ again: | |||
355 | * and s->internal->packet_length == SSL3_RT_HEADER_LENGTH + rr->length */ | 355 | * and s->internal->packet_length == SSL3_RT_HEADER_LENGTH + rr->length */ |
356 | } | 356 | } |
357 | 357 | ||
358 | s->rstate=SSL_ST_READ_HEADER; /* set state for later operations */ | 358 | s->internal->rstate=SSL_ST_READ_HEADER; /* set state for later operations */ |
359 | 359 | ||
360 | /* At this point, s->internal->packet_length == SSL3_RT_HEADER_LNGTH + rr->length, | 360 | /* At this point, s->internal->packet_length == SSL3_RT_HEADER_LNGTH + rr->length, |
361 | * and we have that many bytes in s->internal->packet | 361 | * and we have that many bytes in s->internal->packet |
@@ -666,7 +666,7 @@ do_ssl3_write(SSL *s, int type, const unsigned char *buf, | |||
666 | /* Some servers hang if iniatial client hello is larger than 256 | 666 | /* Some servers hang if iniatial client hello is larger than 256 |
667 | * bytes and record version number > TLS 1.0 | 667 | * bytes and record version number > TLS 1.0 |
668 | */ | 668 | */ |
669 | if (s->state == SSL3_ST_CW_CLNT_HELLO_B && !s->internal->renegotiate && | 669 | if (s->internal->state == SSL3_ST_CW_CLNT_HELLO_B && !s->internal->renegotiate && |
670 | TLS1_get_version(s) > TLS1_VERSION) | 670 | TLS1_get_version(s) > TLS1_VERSION) |
671 | *(p++) = 0x1; | 671 | *(p++) = 0x1; |
672 | else | 672 | else |
@@ -929,7 +929,7 @@ start: | |||
929 | rr = &(S3I(s)->rrec); | 929 | rr = &(S3I(s)->rrec); |
930 | 930 | ||
931 | /* get new packet if necessary */ | 931 | /* get new packet if necessary */ |
932 | if ((rr->length == 0) || (s->rstate == SSL_ST_READ_BODY)) { | 932 | if ((rr->length == 0) || (s->internal->rstate == SSL_ST_READ_BODY)) { |
933 | ret = ssl3_get_record(s); | 933 | ret = ssl3_get_record(s); |
934 | if (ret <= 0) | 934 | if (ret <= 0) |
935 | return (ret); | 935 | return (ret); |
@@ -981,7 +981,7 @@ start: | |||
981 | rr->length -= n; | 981 | rr->length -= n; |
982 | rr->off += n; | 982 | rr->off += n; |
983 | if (rr->length == 0) { | 983 | if (rr->length == 0) { |
984 | s->rstate = SSL_ST_READ_HEADER; | 984 | s->internal->rstate = SSL_ST_READ_HEADER; |
985 | rr->off = 0; | 985 | rr->off = 0; |
986 | if (s->mode & SSL_MODE_RELEASE_BUFFERS && | 986 | if (s->mode & SSL_MODE_RELEASE_BUFFERS && |
987 | s->s3->rbuf.left == 0) | 987 | s->s3->rbuf.left == 0) |
@@ -1215,9 +1215,9 @@ start: | |||
1215 | 1215 | ||
1216 | /* Unexpected handshake message (Client Hello, or protocol violation) */ | 1216 | /* Unexpected handshake message (Client Hello, or protocol violation) */ |
1217 | if ((S3I(s)->handshake_fragment_len >= 4) && !s->internal->in_handshake) { | 1217 | if ((S3I(s)->handshake_fragment_len >= 4) && !s->internal->in_handshake) { |
1218 | if (((s->state&SSL_ST_MASK) == SSL_ST_OK) && | 1218 | if (((s->internal->state&SSL_ST_MASK) == SSL_ST_OK) && |
1219 | !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS)) { | 1219 | !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS)) { |
1220 | s->state = s->server ? SSL_ST_ACCEPT : SSL_ST_CONNECT; | 1220 | s->internal->state = s->server ? SSL_ST_ACCEPT : SSL_ST_CONNECT; |
1221 | s->internal->renegotiate = 1; | 1221 | s->internal->renegotiate = 1; |
1222 | s->internal->new_session = 1; | 1222 | s->internal->new_session = 1; |
1223 | } | 1223 | } |
@@ -1280,12 +1280,12 @@ start: | |||
1280 | */ | 1280 | */ |
1281 | if (S3I(s)->in_read_app_data && | 1281 | if (S3I(s)->in_read_app_data && |
1282 | (S3I(s)->total_renegotiations != 0) && | 1282 | (S3I(s)->total_renegotiations != 0) && |
1283 | (((s->state & SSL_ST_CONNECT) && | 1283 | (((s->internal->state & SSL_ST_CONNECT) && |
1284 | (s->state >= SSL3_ST_CW_CLNT_HELLO_A) && | 1284 | (s->internal->state >= SSL3_ST_CW_CLNT_HELLO_A) && |
1285 | (s->state <= SSL3_ST_CR_SRVR_HELLO_A)) || | 1285 | (s->internal->state <= SSL3_ST_CR_SRVR_HELLO_A)) || |
1286 | ((s->state & SSL_ST_ACCEPT) && | 1286 | ((s->internal->state & SSL_ST_ACCEPT) && |
1287 | (s->state <= SSL3_ST_SW_HELLO_REQ_A) && | 1287 | (s->internal->state <= SSL3_ST_SW_HELLO_REQ_A) && |
1288 | (s->state >= SSL3_ST_SR_CLNT_HELLO_A)))) { | 1288 | (s->internal->state >= SSL3_ST_SR_CLNT_HELLO_A)))) { |
1289 | S3I(s)->in_read_app_data = 2; | 1289 | S3I(s)->in_read_app_data = 2; |
1290 | return (-1); | 1290 | return (-1); |
1291 | } else { | 1291 | } else { |
@@ -1309,7 +1309,7 @@ ssl3_do_change_cipher_spec(SSL *s) | |||
1309 | const char *sender; | 1309 | const char *sender; |
1310 | int slen; | 1310 | int slen; |
1311 | 1311 | ||
1312 | if (s->state & SSL_ST_ACCEPT) | 1312 | if (s->internal->state & SSL_ST_ACCEPT) |
1313 | i = SSL3_CHANGE_CIPHER_SERVER_READ; | 1313 | i = SSL3_CHANGE_CIPHER_SERVER_READ; |
1314 | else | 1314 | else |
1315 | i = SSL3_CHANGE_CIPHER_CLIENT_READ; | 1315 | i = SSL3_CHANGE_CIPHER_CLIENT_READ; |
@@ -1333,7 +1333,7 @@ ssl3_do_change_cipher_spec(SSL *s) | |||
1333 | /* we have to record the message digest at | 1333 | /* we have to record the message digest at |
1334 | * this point so we can get it before we read | 1334 | * this point so we can get it before we read |
1335 | * the finished message */ | 1335 | * the finished message */ |
1336 | if (s->state & SSL_ST_CONNECT) { | 1336 | if (s->internal->state & SSL_ST_CONNECT) { |
1337 | sender = s->method->ssl3_enc->server_finished_label; | 1337 | sender = s->method->ssl3_enc->server_finished_label; |
1338 | slen = s->method->ssl3_enc->server_finished_label_len; | 1338 | slen = s->method->ssl3_enc->server_finished_label_len; |
1339 | } else { | 1339 | } else { |
diff --git a/src/lib/libssl/s3_srvr.c b/src/lib/libssl/s3_srvr.c index 31860eb049..fa958d96f8 100644 --- a/src/lib/libssl/s3_srvr.c +++ b/src/lib/libssl/s3_srvr.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s3_srvr.c,v 1.147 2017/01/23 06:45:30 beck Exp $ */ | 1 | /* $OpenBSD: s3_srvr.c,v 1.148 2017/01/23 08:48:44 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -195,12 +195,12 @@ ssl3_accept(SSL *s) | |||
195 | } | 195 | } |
196 | 196 | ||
197 | for (;;) { | 197 | for (;;) { |
198 | state = s->state; | 198 | state = s->internal->state; |
199 | 199 | ||
200 | switch (s->state) { | 200 | switch (s->internal->state) { |
201 | case SSL_ST_RENEGOTIATE: | 201 | case SSL_ST_RENEGOTIATE: |
202 | s->internal->renegotiate = 1; | 202 | s->internal->renegotiate = 1; |
203 | /* s->state=SSL_ST_ACCEPT; */ | 203 | /* s->internal->state=SSL_ST_ACCEPT; */ |
204 | 204 | ||
205 | case SSL_ST_BEFORE: | 205 | case SSL_ST_BEFORE: |
206 | case SSL_ST_ACCEPT: | 206 | case SSL_ST_ACCEPT: |
@@ -229,7 +229,7 @@ ssl3_accept(SSL *s) | |||
229 | 229 | ||
230 | s->internal->init_num = 0; | 230 | s->internal->init_num = 0; |
231 | 231 | ||
232 | if (s->state != SSL_ST_RENEGOTIATE) { | 232 | if (s->internal->state != SSL_ST_RENEGOTIATE) { |
233 | /* | 233 | /* |
234 | * Ok, we now need to push on a buffering BIO | 234 | * Ok, we now need to push on a buffering BIO |
235 | * so that the output is sent in a way that | 235 | * so that the output is sent in a way that |
@@ -245,7 +245,7 @@ ssl3_accept(SSL *s) | |||
245 | goto end; | 245 | goto end; |
246 | } | 246 | } |
247 | 247 | ||
248 | s->state = SSL3_ST_SR_CLNT_HELLO_A; | 248 | s->internal->state = SSL3_ST_SR_CLNT_HELLO_A; |
249 | s->ctx->internal->stats.sess_accept++; | 249 | s->ctx->internal->stats.sess_accept++; |
250 | } else if (!S3I(s)->send_connection_binding) { | 250 | } else if (!S3I(s)->send_connection_binding) { |
251 | /* | 251 | /* |
@@ -261,11 +261,11 @@ ssl3_accept(SSL *s) | |||
261 | goto end; | 261 | goto end; |
262 | } else { | 262 | } else { |
263 | /* | 263 | /* |
264 | * s->state == SSL_ST_RENEGOTIATE, | 264 | * s->internal->state == SSL_ST_RENEGOTIATE, |
265 | * we will just send a HelloRequest | 265 | * we will just send a HelloRequest |
266 | */ | 266 | */ |
267 | s->ctx->internal->stats.sess_accept_renegotiate++; | 267 | s->ctx->internal->stats.sess_accept_renegotiate++; |
268 | s->state = SSL3_ST_SW_HELLO_REQ_A; | 268 | s->internal->state = SSL3_ST_SW_HELLO_REQ_A; |
269 | } | 269 | } |
270 | break; | 270 | break; |
271 | 271 | ||
@@ -277,7 +277,7 @@ ssl3_accept(SSL *s) | |||
277 | if (ret <= 0) | 277 | if (ret <= 0) |
278 | goto end; | 278 | goto end; |
279 | S3I(s)->tmp.next_state = SSL3_ST_SW_HELLO_REQ_C; | 279 | S3I(s)->tmp.next_state = SSL3_ST_SW_HELLO_REQ_C; |
280 | s->state = SSL3_ST_SW_FLUSH; | 280 | s->internal->state = SSL3_ST_SW_FLUSH; |
281 | s->internal->init_num = 0; | 281 | s->internal->init_num = 0; |
282 | 282 | ||
283 | if (!tls1_init_finished_mac(s)) { | 283 | if (!tls1_init_finished_mac(s)) { |
@@ -287,7 +287,7 @@ ssl3_accept(SSL *s) | |||
287 | break; | 287 | break; |
288 | 288 | ||
289 | case SSL3_ST_SW_HELLO_REQ_C: | 289 | case SSL3_ST_SW_HELLO_REQ_C: |
290 | s->state = SSL_ST_OK; | 290 | s->internal->state = SSL_ST_OK; |
291 | break; | 291 | break; |
292 | 292 | ||
293 | case SSL3_ST_SR_CLNT_HELLO_A: | 293 | case SSL3_ST_SR_CLNT_HELLO_A: |
@@ -302,7 +302,7 @@ ssl3_accept(SSL *s) | |||
302 | } | 302 | } |
303 | 303 | ||
304 | s->internal->renegotiate = 2; | 304 | s->internal->renegotiate = 2; |
305 | s->state = SSL3_ST_SW_SRVR_HELLO_A; | 305 | s->internal->state = SSL3_ST_SW_SRVR_HELLO_A; |
306 | s->internal->init_num = 0; | 306 | s->internal->init_num = 0; |
307 | break; | 307 | break; |
308 | 308 | ||
@@ -313,12 +313,12 @@ ssl3_accept(SSL *s) | |||
313 | goto end; | 313 | goto end; |
314 | if (s->internal->hit) { | 314 | if (s->internal->hit) { |
315 | if (s->internal->tlsext_ticket_expected) | 315 | if (s->internal->tlsext_ticket_expected) |
316 | s->state = SSL3_ST_SW_SESSION_TICKET_A; | 316 | s->internal->state = SSL3_ST_SW_SESSION_TICKET_A; |
317 | else | 317 | else |
318 | s->state = SSL3_ST_SW_CHANGE_A; | 318 | s->internal->state = SSL3_ST_SW_CHANGE_A; |
319 | } | 319 | } |
320 | else | 320 | else |
321 | s->state = SSL3_ST_SW_CERT_A; | 321 | s->internal->state = SSL3_ST_SW_CERT_A; |
322 | s->internal->init_num = 0; | 322 | s->internal->init_num = 0; |
323 | break; | 323 | break; |
324 | 324 | ||
@@ -331,12 +331,12 @@ ssl3_accept(SSL *s) | |||
331 | if (ret <= 0) | 331 | if (ret <= 0) |
332 | goto end; | 332 | goto end; |
333 | if (s->internal->tlsext_status_expected) | 333 | if (s->internal->tlsext_status_expected) |
334 | s->state = SSL3_ST_SW_CERT_STATUS_A; | 334 | s->internal->state = SSL3_ST_SW_CERT_STATUS_A; |
335 | else | 335 | else |
336 | s->state = SSL3_ST_SW_KEY_EXCH_A; | 336 | s->internal->state = SSL3_ST_SW_KEY_EXCH_A; |
337 | } else { | 337 | } else { |
338 | skip = 1; | 338 | skip = 1; |
339 | s->state = SSL3_ST_SW_KEY_EXCH_A; | 339 | s->internal->state = SSL3_ST_SW_KEY_EXCH_A; |
340 | } | 340 | } |
341 | s->internal->init_num = 0; | 341 | s->internal->init_num = 0; |
342 | break; | 342 | break; |
@@ -360,7 +360,7 @@ ssl3_accept(SSL *s) | |||
360 | } else | 360 | } else |
361 | skip = 1; | 361 | skip = 1; |
362 | 362 | ||
363 | s->state = SSL3_ST_SW_CERT_REQ_A; | 363 | s->internal->state = SSL3_ST_SW_CERT_REQ_A; |
364 | s->internal->init_num = 0; | 364 | s->internal->init_num = 0; |
365 | break; | 365 | break; |
366 | 366 | ||
@@ -392,7 +392,7 @@ ssl3_accept(SSL *s) | |||
392 | /* No cert request */ | 392 | /* No cert request */ |
393 | skip = 1; | 393 | skip = 1; |
394 | S3I(s)->tmp.cert_request = 0; | 394 | S3I(s)->tmp.cert_request = 0; |
395 | s->state = SSL3_ST_SW_SRVR_DONE_A; | 395 | s->internal->state = SSL3_ST_SW_SRVR_DONE_A; |
396 | if (S3I(s)->handshake_buffer) { | 396 | if (S3I(s)->handshake_buffer) { |
397 | if (!tls1_digest_cached_records(s)) { | 397 | if (!tls1_digest_cached_records(s)) { |
398 | ret = -1; | 398 | ret = -1; |
@@ -404,7 +404,7 @@ ssl3_accept(SSL *s) | |||
404 | ret = ssl3_send_certificate_request(s); | 404 | ret = ssl3_send_certificate_request(s); |
405 | if (ret <= 0) | 405 | if (ret <= 0) |
406 | goto end; | 406 | goto end; |
407 | s->state = SSL3_ST_SW_SRVR_DONE_A; | 407 | s->internal->state = SSL3_ST_SW_SRVR_DONE_A; |
408 | s->internal->init_num = 0; | 408 | s->internal->init_num = 0; |
409 | } | 409 | } |
410 | break; | 410 | break; |
@@ -415,7 +415,7 @@ ssl3_accept(SSL *s) | |||
415 | if (ret <= 0) | 415 | if (ret <= 0) |
416 | goto end; | 416 | goto end; |
417 | S3I(s)->tmp.next_state = SSL3_ST_SR_CERT_A; | 417 | S3I(s)->tmp.next_state = SSL3_ST_SR_CERT_A; |
418 | s->state = SSL3_ST_SW_FLUSH; | 418 | s->internal->state = SSL3_ST_SW_FLUSH; |
419 | s->internal->init_num = 0; | 419 | s->internal->init_num = 0; |
420 | break; | 420 | break; |
421 | 421 | ||
@@ -439,7 +439,7 @@ ssl3_accept(SSL *s) | |||
439 | } | 439 | } |
440 | s->internal->rwstate = SSL_NOTHING; | 440 | s->internal->rwstate = SSL_NOTHING; |
441 | 441 | ||
442 | s->state = S3I(s)->tmp.next_state; | 442 | s->internal->state = S3I(s)->tmp.next_state; |
443 | break; | 443 | break; |
444 | 444 | ||
445 | case SSL3_ST_SR_CERT_A: | 445 | case SSL3_ST_SR_CERT_A: |
@@ -450,7 +450,7 @@ ssl3_accept(SSL *s) | |||
450 | goto end; | 450 | goto end; |
451 | } | 451 | } |
452 | s->internal->init_num = 0; | 452 | s->internal->init_num = 0; |
453 | s->state = SSL3_ST_SR_KEY_EXCH_A; | 453 | s->internal->state = SSL3_ST_SR_KEY_EXCH_A; |
454 | break; | 454 | break; |
455 | 455 | ||
456 | case SSL3_ST_SR_KEY_EXCH_A: | 456 | case SSL3_ST_SR_KEY_EXCH_A: |
@@ -470,12 +470,12 @@ ssl3_accept(SSL *s) | |||
470 | * for key exchange. | 470 | * for key exchange. |
471 | */ | 471 | */ |
472 | if (S3I(s)->next_proto_neg_seen) | 472 | if (S3I(s)->next_proto_neg_seen) |
473 | s->state = SSL3_ST_SR_NEXT_PROTO_A; | 473 | s->internal->state = SSL3_ST_SR_NEXT_PROTO_A; |
474 | else | 474 | else |
475 | s->state = SSL3_ST_SR_FINISHED_A; | 475 | s->internal->state = SSL3_ST_SR_FINISHED_A; |
476 | s->internal->init_num = 0; | 476 | s->internal->init_num = 0; |
477 | } else if (SSL_USE_SIGALGS(s) || (alg_k & SSL_kGOST)) { | 477 | } else if (SSL_USE_SIGALGS(s) || (alg_k & SSL_kGOST)) { |
478 | s->state = SSL3_ST_SR_CERT_VRFY_A; | 478 | s->internal->state = SSL3_ST_SR_CERT_VRFY_A; |
479 | s->internal->init_num = 0; | 479 | s->internal->init_num = 0; |
480 | if (!s->session->peer) | 480 | if (!s->session->peer) |
481 | break; | 481 | break; |
@@ -498,7 +498,7 @@ ssl3_accept(SSL *s) | |||
498 | int offset = 0; | 498 | int offset = 0; |
499 | int dgst_num; | 499 | int dgst_num; |
500 | 500 | ||
501 | s->state = SSL3_ST_SR_CERT_VRFY_A; | 501 | s->internal->state = SSL3_ST_SR_CERT_VRFY_A; |
502 | s->internal->init_num = 0; | 502 | s->internal->init_num = 0; |
503 | 503 | ||
504 | /* | 504 | /* |
@@ -544,9 +544,9 @@ ssl3_accept(SSL *s) | |||
544 | goto end; | 544 | goto end; |
545 | 545 | ||
546 | if (S3I(s)->next_proto_neg_seen) | 546 | if (S3I(s)->next_proto_neg_seen) |
547 | s->state = SSL3_ST_SR_NEXT_PROTO_A; | 547 | s->internal->state = SSL3_ST_SR_NEXT_PROTO_A; |
548 | else | 548 | else |
549 | s->state = SSL3_ST_SR_FINISHED_A; | 549 | s->internal->state = SSL3_ST_SR_FINISHED_A; |
550 | s->internal->init_num = 0; | 550 | s->internal->init_num = 0; |
551 | break; | 551 | break; |
552 | 552 | ||
@@ -556,7 +556,7 @@ ssl3_accept(SSL *s) | |||
556 | if (ret <= 0) | 556 | if (ret <= 0) |
557 | goto end; | 557 | goto end; |
558 | s->internal->init_num = 0; | 558 | s->internal->init_num = 0; |
559 | s->state = SSL3_ST_SR_FINISHED_A; | 559 | s->internal->state = SSL3_ST_SR_FINISHED_A; |
560 | break; | 560 | break; |
561 | 561 | ||
562 | case SSL3_ST_SR_FINISHED_A: | 562 | case SSL3_ST_SR_FINISHED_A: |
@@ -567,11 +567,11 @@ ssl3_accept(SSL *s) | |||
567 | if (ret <= 0) | 567 | if (ret <= 0) |
568 | goto end; | 568 | goto end; |
569 | if (s->internal->hit) | 569 | if (s->internal->hit) |
570 | s->state = SSL_ST_OK; | 570 | s->internal->state = SSL_ST_OK; |
571 | else if (s->internal->tlsext_ticket_expected) | 571 | else if (s->internal->tlsext_ticket_expected) |
572 | s->state = SSL3_ST_SW_SESSION_TICKET_A; | 572 | s->internal->state = SSL3_ST_SW_SESSION_TICKET_A; |
573 | else | 573 | else |
574 | s->state = SSL3_ST_SW_CHANGE_A; | 574 | s->internal->state = SSL3_ST_SW_CHANGE_A; |
575 | s->internal->init_num = 0; | 575 | s->internal->init_num = 0; |
576 | break; | 576 | break; |
577 | 577 | ||
@@ -580,7 +580,7 @@ ssl3_accept(SSL *s) | |||
580 | ret = ssl3_send_newsession_ticket(s); | 580 | ret = ssl3_send_newsession_ticket(s); |
581 | if (ret <= 0) | 581 | if (ret <= 0) |
582 | goto end; | 582 | goto end; |
583 | s->state = SSL3_ST_SW_CHANGE_A; | 583 | s->internal->state = SSL3_ST_SW_CHANGE_A; |
584 | s->internal->init_num = 0; | 584 | s->internal->init_num = 0; |
585 | break; | 585 | break; |
586 | 586 | ||
@@ -589,7 +589,7 @@ ssl3_accept(SSL *s) | |||
589 | ret = ssl3_send_cert_status(s); | 589 | ret = ssl3_send_cert_status(s); |
590 | if (ret <= 0) | 590 | if (ret <= 0) |
591 | goto end; | 591 | goto end; |
592 | s->state = SSL3_ST_SW_KEY_EXCH_A; | 592 | s->internal->state = SSL3_ST_SW_KEY_EXCH_A; |
593 | s->internal->init_num = 0; | 593 | s->internal->init_num = 0; |
594 | break; | 594 | break; |
595 | 595 | ||
@@ -608,7 +608,7 @@ ssl3_accept(SSL *s) | |||
608 | 608 | ||
609 | if (ret <= 0) | 609 | if (ret <= 0) |
610 | goto end; | 610 | goto end; |
611 | s->state = SSL3_ST_SW_FINISHED_A; | 611 | s->internal->state = SSL3_ST_SW_FINISHED_A; |
612 | s->internal->init_num = 0; | 612 | s->internal->init_num = 0; |
613 | 613 | ||
614 | if (!s->method->ssl3_enc->change_cipher_state( | 614 | if (!s->method->ssl3_enc->change_cipher_state( |
@@ -627,7 +627,7 @@ ssl3_accept(SSL *s) | |||
627 | s->method->ssl3_enc->server_finished_label_len); | 627 | s->method->ssl3_enc->server_finished_label_len); |
628 | if (ret <= 0) | 628 | if (ret <= 0) |
629 | goto end; | 629 | goto end; |
630 | s->state = SSL3_ST_SW_FLUSH; | 630 | s->internal->state = SSL3_ST_SW_FLUSH; |
631 | if (s->internal->hit) { | 631 | if (s->internal->hit) { |
632 | if (S3I(s)->next_proto_neg_seen) { | 632 | if (S3I(s)->next_proto_neg_seen) { |
633 | s->s3->flags |= SSL3_FLAGS_CCS_OK; | 633 | s->s3->flags |= SSL3_FLAGS_CCS_OK; |
@@ -687,11 +687,11 @@ ssl3_accept(SSL *s) | |||
687 | } | 687 | } |
688 | 688 | ||
689 | 689 | ||
690 | if ((cb != NULL) && (s->state != state)) { | 690 | if ((cb != NULL) && (s->internal->state != state)) { |
691 | new_state = s->state; | 691 | new_state = s->internal->state; |
692 | s->state = state; | 692 | s->internal->state = state; |
693 | cb(s, SSL_CB_ACCEPT_LOOP, 1); | 693 | cb(s, SSL_CB_ACCEPT_LOOP, 1); |
694 | s->state = new_state; | 694 | s->internal->state = new_state; |
695 | } | 695 | } |
696 | } | 696 | } |
697 | skip = 0; | 697 | skip = 0; |
@@ -708,11 +708,11 @@ end: | |||
708 | int | 708 | int |
709 | ssl3_send_hello_request(SSL *s) | 709 | ssl3_send_hello_request(SSL *s) |
710 | { | 710 | { |
711 | if (s->state == SSL3_ST_SW_HELLO_REQ_A) { | 711 | if (s->internal->state == SSL3_ST_SW_HELLO_REQ_A) { |
712 | ssl3_handshake_msg_start(s, SSL3_MT_HELLO_REQUEST); | 712 | ssl3_handshake_msg_start(s, SSL3_MT_HELLO_REQUEST); |
713 | ssl3_handshake_msg_finish(s, 0); | 713 | ssl3_handshake_msg_finish(s, 0); |
714 | 714 | ||
715 | s->state = SSL3_ST_SW_HELLO_REQ_B; | 715 | s->internal->state = SSL3_ST_SW_HELLO_REQ_B; |
716 | } | 716 | } |
717 | 717 | ||
718 | /* SSL3_ST_SW_HELLO_REQ_B */ | 718 | /* SSL3_ST_SW_HELLO_REQ_B */ |
@@ -738,8 +738,8 @@ ssl3_get_client_hello(SSL *s) | |||
738 | * If we are SSLv3, we will respond with SSLv3, even if prompted with | 738 | * If we are SSLv3, we will respond with SSLv3, even if prompted with |
739 | * TLSv1. | 739 | * TLSv1. |
740 | */ | 740 | */ |
741 | if (s->state == SSL3_ST_SR_CLNT_HELLO_A) { | 741 | if (s->internal->state == SSL3_ST_SR_CLNT_HELLO_A) { |
742 | s->state = SSL3_ST_SR_CLNT_HELLO_B; | 742 | s->internal->state = SSL3_ST_SR_CLNT_HELLO_B; |
743 | } | 743 | } |
744 | s->internal->first_packet = 1; | 744 | s->internal->first_packet = 1; |
745 | n = s->method->ssl_get_message(s, SSL3_ST_SR_CLNT_HELLO_B, | 745 | n = s->method->ssl_get_message(s, SSL3_ST_SR_CLNT_HELLO_B, |
@@ -1099,7 +1099,7 @@ ssl3_send_server_hello(SSL *s) | |||
1099 | 1099 | ||
1100 | bufend = (unsigned char *)s->internal->init_buf->data + SSL3_RT_MAX_PLAIN_LENGTH; | 1100 | bufend = (unsigned char *)s->internal->init_buf->data + SSL3_RT_MAX_PLAIN_LENGTH; |
1101 | 1101 | ||
1102 | if (s->state == SSL3_ST_SW_SRVR_HELLO_A) { | 1102 | if (s->internal->state == SSL3_ST_SW_SRVR_HELLO_A) { |
1103 | d = p = ssl3_handshake_msg_start(s, SSL3_MT_SERVER_HELLO); | 1103 | d = p = ssl3_handshake_msg_start(s, SSL3_MT_SERVER_HELLO); |
1104 | 1104 | ||
1105 | if (!CBB_init_fixed(&cbb, p, bufend - p)) | 1105 | if (!CBB_init_fixed(&cbb, p, bufend - p)) |
@@ -1179,11 +1179,11 @@ ssl3_send_server_hello(SSL *s) | |||
1179 | int | 1179 | int |
1180 | ssl3_send_server_done(SSL *s) | 1180 | ssl3_send_server_done(SSL *s) |
1181 | { | 1181 | { |
1182 | if (s->state == SSL3_ST_SW_SRVR_DONE_A) { | 1182 | if (s->internal->state == SSL3_ST_SW_SRVR_DONE_A) { |
1183 | ssl3_handshake_msg_start(s, SSL3_MT_SERVER_DONE); | 1183 | ssl3_handshake_msg_start(s, SSL3_MT_SERVER_DONE); |
1184 | ssl3_handshake_msg_finish(s, 0); | 1184 | ssl3_handshake_msg_finish(s, 0); |
1185 | 1185 | ||
1186 | s->state = SSL3_ST_SW_SRVR_DONE_B; | 1186 | s->internal->state = SSL3_ST_SW_SRVR_DONE_B; |
1187 | } | 1187 | } |
1188 | 1188 | ||
1189 | /* SSL3_ST_SW_SRVR_DONE_B */ | 1189 | /* SSL3_ST_SW_SRVR_DONE_B */ |
@@ -1487,7 +1487,7 @@ ssl3_send_server_key_exchange(SSL *s) | |||
1487 | memset(&cbb, 0, sizeof(cbb)); | 1487 | memset(&cbb, 0, sizeof(cbb)); |
1488 | 1488 | ||
1489 | EVP_MD_CTX_init(&md_ctx); | 1489 | EVP_MD_CTX_init(&md_ctx); |
1490 | if (s->state == SSL3_ST_SW_KEY_EXCH_A) { | 1490 | if (s->internal->state == SSL3_ST_SW_KEY_EXCH_A) { |
1491 | type = S3I(s)->tmp.new_cipher->algorithm_mkey; | 1491 | type = S3I(s)->tmp.new_cipher->algorithm_mkey; |
1492 | cert = s->cert; | 1492 | cert = s->cert; |
1493 | 1493 | ||
@@ -1621,7 +1621,7 @@ ssl3_send_server_key_exchange(SSL *s) | |||
1621 | ssl3_handshake_msg_finish(s, n); | 1621 | ssl3_handshake_msg_finish(s, n); |
1622 | } | 1622 | } |
1623 | 1623 | ||
1624 | s->state = SSL3_ST_SW_KEY_EXCH_B; | 1624 | s->internal->state = SSL3_ST_SW_KEY_EXCH_B; |
1625 | 1625 | ||
1626 | EVP_MD_CTX_cleanup(&md_ctx); | 1626 | EVP_MD_CTX_cleanup(&md_ctx); |
1627 | 1627 | ||
@@ -1646,7 +1646,7 @@ ssl3_send_certificate_request(SSL *s) | |||
1646 | X509_NAME *name; | 1646 | X509_NAME *name; |
1647 | BUF_MEM *buf; | 1647 | BUF_MEM *buf; |
1648 | 1648 | ||
1649 | if (s->state == SSL3_ST_SW_CERT_REQ_A) { | 1649 | if (s->internal->state == SSL3_ST_SW_CERT_REQ_A) { |
1650 | buf = s->internal->init_buf; | 1650 | buf = s->internal->init_buf; |
1651 | 1651 | ||
1652 | d = p = ssl3_handshake_msg_start(s, | 1652 | d = p = ssl3_handshake_msg_start(s, |
@@ -1699,7 +1699,7 @@ ssl3_send_certificate_request(SSL *s) | |||
1699 | 1699 | ||
1700 | ssl3_handshake_msg_finish(s, n); | 1700 | ssl3_handshake_msg_finish(s, n); |
1701 | 1701 | ||
1702 | s->state = SSL3_ST_SW_CERT_REQ_B; | 1702 | s->internal->state = SSL3_ST_SW_CERT_REQ_B; |
1703 | } | 1703 | } |
1704 | 1704 | ||
1705 | /* SSL3_ST_SW_CERT_REQ_B */ | 1705 | /* SSL3_ST_SW_CERT_REQ_B */ |
@@ -2640,7 +2640,7 @@ ssl3_send_server_certificate(SSL *s) | |||
2640 | 2640 | ||
2641 | memset(&cbb, 0, sizeof(cbb)); | 2641 | memset(&cbb, 0, sizeof(cbb)); |
2642 | 2642 | ||
2643 | if (s->state == SSL3_ST_SW_CERT_A) { | 2643 | if (s->internal->state == SSL3_ST_SW_CERT_A) { |
2644 | if ((x = ssl_get_server_send_cert(s)) == NULL) { | 2644 | if ((x = ssl_get_server_send_cert(s)) == NULL) { |
2645 | SSLerr(SSL_F_SSL3_SEND_SERVER_CERTIFICATE, | 2645 | SSLerr(SSL_F_SSL3_SEND_SERVER_CERTIFICATE, |
2646 | ERR_R_INTERNAL_ERROR); | 2646 | ERR_R_INTERNAL_ERROR); |
@@ -2655,7 +2655,7 @@ ssl3_send_server_certificate(SSL *s) | |||
2655 | if (!ssl3_handshake_msg_finish_cbb(s, &cbb)) | 2655 | if (!ssl3_handshake_msg_finish_cbb(s, &cbb)) |
2656 | goto err; | 2656 | goto err; |
2657 | 2657 | ||
2658 | s->state = SSL3_ST_SW_CERT_B; | 2658 | s->internal->state = SSL3_ST_SW_CERT_B; |
2659 | } | 2659 | } |
2660 | 2660 | ||
2661 | /* SSL3_ST_SW_CERT_B */ | 2661 | /* SSL3_ST_SW_CERT_B */ |
@@ -2683,7 +2683,7 @@ ssl3_send_newsession_ticket(SSL *s) | |||
2683 | unsigned char iv[EVP_MAX_IV_LENGTH]; | 2683 | unsigned char iv[EVP_MAX_IV_LENGTH]; |
2684 | unsigned char key_name[16]; | 2684 | unsigned char key_name[16]; |
2685 | 2685 | ||
2686 | if (s->state == SSL3_ST_SW_SESSION_TICKET_A) { | 2686 | if (s->internal->state == SSL3_ST_SW_SESSION_TICKET_A) { |
2687 | /* get session encoding length */ | 2687 | /* get session encoding length */ |
2688 | slen_full = i2d_SSL_SESSION(s->session, NULL); | 2688 | slen_full = i2d_SSL_SESSION(s->session, NULL); |
2689 | /* | 2689 | /* |
@@ -2796,7 +2796,7 @@ ssl3_send_newsession_ticket(SSL *s) | |||
2796 | 2796 | ||
2797 | ssl3_handshake_msg_finish(s, len); | 2797 | ssl3_handshake_msg_finish(s, len); |
2798 | 2798 | ||
2799 | s->state = SSL3_ST_SW_SESSION_TICKET_B; | 2799 | s->internal->state = SSL3_ST_SW_SESSION_TICKET_B; |
2800 | 2800 | ||
2801 | explicit_bzero(senc, slen_full); | 2801 | explicit_bzero(senc, slen_full); |
2802 | free(senc); | 2802 | free(senc); |
@@ -2818,7 +2818,7 @@ ssl3_send_cert_status(SSL *s) | |||
2818 | { | 2818 | { |
2819 | unsigned char *p; | 2819 | unsigned char *p; |
2820 | 2820 | ||
2821 | if (s->state == SSL3_ST_SW_CERT_STATUS_A) { | 2821 | if (s->internal->state == SSL3_ST_SW_CERT_STATUS_A) { |
2822 | /* | 2822 | /* |
2823 | * Grow buffer if need be: the length calculation is as | 2823 | * Grow buffer if need be: the length calculation is as |
2824 | * follows 1 (message type) + 3 (message length) + | 2824 | * follows 1 (message type) + 3 (message length) + |
@@ -2837,7 +2837,7 @@ ssl3_send_cert_status(SSL *s) | |||
2837 | 2837 | ||
2838 | ssl3_handshake_msg_finish(s, s->internal->tlsext_ocsp_resplen + 4); | 2838 | ssl3_handshake_msg_finish(s, s->internal->tlsext_ocsp_resplen + 4); |
2839 | 2839 | ||
2840 | s->state = SSL3_ST_SW_CERT_STATUS_B; | 2840 | s->internal->state = SSL3_ST_SW_CERT_STATUS_B; |
2841 | } | 2841 | } |
2842 | 2842 | ||
2843 | /* SSL3_ST_SW_CERT_STATUS_B */ | 2843 | /* SSL3_ST_SW_CERT_STATUS_B */ |
@@ -2873,7 +2873,7 @@ ssl3_get_next_proto(SSL *s) | |||
2873 | return ((int)n); | 2873 | return ((int)n); |
2874 | 2874 | ||
2875 | /* | 2875 | /* |
2876 | * s->state doesn't reflect whether ChangeCipherSpec has been received | 2876 | * s->internal->state doesn't reflect whether ChangeCipherSpec has been received |
2877 | * in this handshake, but S3I(s)->change_cipher_spec does (will be reset | 2877 | * in this handshake, but S3I(s)->change_cipher_spec does (will be reset |
2878 | * by ssl3_get_finished). | 2878 | * by ssl3_get_finished). |
2879 | */ | 2879 | */ |
diff --git a/src/lib/libssl/ssl.h b/src/lib/libssl/ssl.h index 678246b23e..f29626dc03 100644 --- a/src/lib/libssl/ssl.h +++ b/src/lib/libssl/ssl.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl.h,v 1.115 2017/01/23 08:08:06 beck Exp $ */ | 1 | /* $OpenBSD: ssl.h,v 1.116 2017/01/23 08:48:44 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -846,9 +846,6 @@ struct ssl_st { | |||
846 | #endif | 846 | #endif |
847 | int server; /* are we the server side? - mostly used by SSL_clear*/ | 847 | int server; /* are we the server side? - mostly used by SSL_clear*/ |
848 | 848 | ||
849 | int state; /* where we are */ | ||
850 | int rstate; /* where we are when reading */ | ||
851 | |||
852 | struct ssl3_state_st *s3; /* SSLv3 variables */ | 849 | struct ssl3_state_st *s3; /* SSLv3 variables */ |
853 | struct dtls1_state_st *d1; /* DTLSv1 variables */ | 850 | struct dtls1_state_st *d1; /* DTLSv1 variables */ |
854 | 851 | ||
diff --git a/src/lib/libssl/ssl_lib.c b/src/lib/libssl/ssl_lib.c index 5839bd8048..571ecee509 100644 --- a/src/lib/libssl/ssl_lib.c +++ b/src/lib/libssl/ssl_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_lib.c,v 1.136 2017/01/23 08:08:06 beck Exp $ */ | 1 | /* $OpenBSD: ssl_lib.c,v 1.137 2017/01/23 08:48:44 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -210,12 +210,12 @@ SSL_clear(SSL *s) | |||
210 | 210 | ||
211 | s->internal->type = 0; | 211 | s->internal->type = 0; |
212 | 212 | ||
213 | s->state = SSL_ST_BEFORE|((s->server) ? SSL_ST_ACCEPT : SSL_ST_CONNECT); | 213 | s->internal->state = SSL_ST_BEFORE|((s->server) ? SSL_ST_ACCEPT : SSL_ST_CONNECT); |
214 | 214 | ||
215 | s->version = s->method->version; | 215 | s->version = s->method->version; |
216 | s->client_version = s->version; | 216 | s->client_version = s->version; |
217 | s->internal->rwstate = SSL_NOTHING; | 217 | s->internal->rwstate = SSL_NOTHING; |
218 | s->rstate = SSL_ST_READ_HEADER; | 218 | s->internal->rstate = SSL_ST_READ_HEADER; |
219 | 219 | ||
220 | BUF_MEM_free(s->internal->init_buf); | 220 | BUF_MEM_free(s->internal->init_buf); |
221 | s->internal->init_buf = NULL; | 221 | s->internal->init_buf = NULL; |
@@ -2430,7 +2430,7 @@ SSL_set_accept_state(SSL *s) | |||
2430 | { | 2430 | { |
2431 | s->server = 1; | 2431 | s->server = 1; |
2432 | s->internal->shutdown = 0; | 2432 | s->internal->shutdown = 0; |
2433 | s->state = SSL_ST_ACCEPT|SSL_ST_BEFORE; | 2433 | s->internal->state = SSL_ST_ACCEPT|SSL_ST_BEFORE; |
2434 | s->internal->handshake_func = s->method->ssl_accept; | 2434 | s->internal->handshake_func = s->method->ssl_accept; |
2435 | /* clear the current cipher */ | 2435 | /* clear the current cipher */ |
2436 | ssl_clear_cipher_ctx(s); | 2436 | ssl_clear_cipher_ctx(s); |
@@ -2443,7 +2443,7 @@ SSL_set_connect_state(SSL *s) | |||
2443 | { | 2443 | { |
2444 | s->server = 0; | 2444 | s->server = 0; |
2445 | s->internal->shutdown = 0; | 2445 | s->internal->shutdown = 0; |
2446 | s->state = SSL_ST_CONNECT|SSL_ST_BEFORE; | 2446 | s->internal->state = SSL_ST_CONNECT|SSL_ST_BEFORE; |
2447 | s->internal->handshake_func = s->method->ssl_connect; | 2447 | s->internal->handshake_func = s->method->ssl_connect; |
2448 | /* clear the current cipher */ | 2448 | /* clear the current cipher */ |
2449 | ssl_clear_cipher_ctx(s); | 2449 | ssl_clear_cipher_ctx(s); |
@@ -2681,8 +2681,8 @@ SSL_dup(SSL *s) | |||
2681 | ret->internal->quiet_shutdown = s->internal->quiet_shutdown; | 2681 | ret->internal->quiet_shutdown = s->internal->quiet_shutdown; |
2682 | ret->internal->shutdown = s->internal->shutdown; | 2682 | ret->internal->shutdown = s->internal->shutdown; |
2683 | /* SSL_dup does not really work at any state, though */ | 2683 | /* SSL_dup does not really work at any state, though */ |
2684 | ret->state=s->state; | 2684 | ret->internal->state = s->internal->state; |
2685 | ret->rstate = s->rstate; | 2685 | ret->internal->rstate = s->internal->rstate; |
2686 | 2686 | ||
2687 | /* | 2687 | /* |
2688 | * Would have to copy ret->init_buf, ret->init_msg, ret->init_num, | 2688 | * Would have to copy ret->init_buf, ret->init_msg, ret->init_num, |
@@ -2941,13 +2941,13 @@ void (*SSL_get_info_callback(const SSL *ssl))(const SSL *ssl, int type, int val) | |||
2941 | int | 2941 | int |
2942 | SSL_state(const SSL *ssl) | 2942 | SSL_state(const SSL *ssl) |
2943 | { | 2943 | { |
2944 | return (ssl->state); | 2944 | return (ssl->internal->state); |
2945 | } | 2945 | } |
2946 | 2946 | ||
2947 | void | 2947 | void |
2948 | SSL_set_state(SSL *ssl, int state) | 2948 | SSL_set_state(SSL *ssl, int state) |
2949 | { | 2949 | { |
2950 | ssl->state = state; | 2950 | ssl->internal->state = state; |
2951 | } | 2951 | } |
2952 | 2952 | ||
2953 | void | 2953 | void |
diff --git a/src/lib/libssl/ssl_locl.h b/src/lib/libssl/ssl_locl.h index 6da2ce3fab..1aac55f101 100644 --- a/src/lib/libssl/ssl_locl.h +++ b/src/lib/libssl/ssl_locl.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_locl.h,v 1.159 2017/01/23 08:08:06 beck Exp $ */ | 1 | /* $OpenBSD: ssl_locl.h,v 1.160 2017/01/23 08:48:44 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -723,6 +723,10 @@ typedef struct ssl_internal_st { | |||
723 | int renegotiate;/* 1 if we are renegotiating. | 723 | int renegotiate;/* 1 if we are renegotiating. |
724 | * 2 if we are a server and are inside a handshake | 724 | * 2 if we are a server and are inside a handshake |
725 | * (i.e. not just sending a HelloRequest) */ | 725 | * (i.e. not just sending a HelloRequest) */ |
726 | |||
727 | int state; /* where we are */ | ||
728 | int rstate; /* where we are when reading */ | ||
729 | |||
726 | } SSL_INTERNAL; | 730 | } SSL_INTERNAL; |
727 | 731 | ||
728 | typedef struct ssl3_state_internal_st { | 732 | typedef struct ssl3_state_internal_st { |
diff --git a/src/lib/libssl/ssl_stat.c b/src/lib/libssl/ssl_stat.c index 6d67d19c25..4f93781f72 100644 --- a/src/lib/libssl/ssl_stat.c +++ b/src/lib/libssl/ssl_stat.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_stat.c,v 1.12 2014/11/16 14:12:47 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_stat.c,v 1.13 2017/01/23 08:48:45 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -91,7 +91,7 @@ SSL_state_string_long(const SSL *s) | |||
91 | { | 91 | { |
92 | const char *str; | 92 | const char *str; |
93 | 93 | ||
94 | switch (s->state) { | 94 | switch (s->internal->state) { |
95 | case SSL_ST_BEFORE: | 95 | case SSL_ST_BEFORE: |
96 | str = "before SSL initialization"; | 96 | str = "before SSL initialization"; |
97 | break; | 97 | break; |
@@ -325,7 +325,7 @@ SSL_rstate_string_long(const SSL *s) | |||
325 | { | 325 | { |
326 | const char *str; | 326 | const char *str; |
327 | 327 | ||
328 | switch (s->rstate) { | 328 | switch (s->internal->rstate) { |
329 | case SSL_ST_READ_HEADER: | 329 | case SSL_ST_READ_HEADER: |
330 | str = "read header"; | 330 | str = "read header"; |
331 | break; | 331 | break; |
@@ -347,7 +347,7 @@ SSL_state_string(const SSL *s) | |||
347 | { | 347 | { |
348 | const char *str; | 348 | const char *str; |
349 | 349 | ||
350 | switch (s->state) { | 350 | switch (s->internal->state) { |
351 | case SSL_ST_BEFORE: | 351 | case SSL_ST_BEFORE: |
352 | str = "PINIT "; | 352 | str = "PINIT "; |
353 | break; | 353 | break; |
@@ -783,7 +783,7 @@ SSL_rstate_string(const SSL *s) | |||
783 | { | 783 | { |
784 | const char *str; | 784 | const char *str; |
785 | 785 | ||
786 | switch (s->rstate) { | 786 | switch (s->internal->rstate) { |
787 | case SSL_ST_READ_HEADER: | 787 | case SSL_ST_READ_HEADER: |
788 | str = "RH"; | 788 | str = "RH"; |
789 | break; | 789 | break; |
diff --git a/src/lib/libssl/t1_lib.c b/src/lib/libssl/t1_lib.c index f0a9ed5dc1..fb01bfcfac 100644 --- a/src/lib/libssl/t1_lib.c +++ b/src/lib/libssl/t1_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: t1_lib.c,v 1.103 2017/01/23 06:45:30 beck Exp $ */ | 1 | /* $OpenBSD: t1_lib.c,v 1.104 2017/01/23 08:48:45 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -924,7 +924,7 @@ skip_ext: | |||
924 | * includes the 5-byte record header in the buffer, while the | 924 | * includes the 5-byte record header in the buffer, while the |
925 | * code in s3_clnt.c does not. | 925 | * code in s3_clnt.c does not. |
926 | */ | 926 | */ |
927 | if (s->state == SSL23_ST_CW_CLNT_HELLO_A) | 927 | if (s->internal->state == SSL23_ST_CW_CLNT_HELLO_A) |
928 | hlen -= 5; | 928 | hlen -= 5; |
929 | if (hlen > 0xff && hlen < 0x200) { | 929 | if (hlen > 0xff && hlen < 0x200) { |
930 | hlen = 0x200 - hlen; | 930 | hlen = 0x200 - hlen; |