diff options
| author | jsing <> | 2014-05-31 10:49:28 +0000 |
|---|---|---|
| committer | jsing <> | 2014-05-31 10:49:28 +0000 |
| commit | cc0b160e462358c219bef48df27be2e816b65194 (patch) | |
| tree | 32a374445fa15f520b06510f07c011a6234df599 /src/lib/libssl/d1_clnt.c | |
| parent | 57e924c96320c9b14de6078fc75984c949b073b2 (diff) | |
| download | openbsd-cc0b160e462358c219bef48df27be2e816b65194.tar.gz openbsd-cc0b160e462358c219bef48df27be2e816b65194.tar.bz2 openbsd-cc0b160e462358c219bef48df27be2e816b65194.zip | |
TLS would not be entirely functional without extensions, so unifdef
OPENSSL_NO_TLSEXT.
ok tedu@
Diffstat (limited to 'src/lib/libssl/d1_clnt.c')
| -rw-r--r-- | src/lib/libssl/d1_clnt.c | 19 |
1 files changed, 0 insertions, 19 deletions
diff --git a/src/lib/libssl/d1_clnt.c b/src/lib/libssl/d1_clnt.c index e8b43f3268..fe5f1aa200 100644 --- a/src/lib/libssl/d1_clnt.c +++ b/src/lib/libssl/d1_clnt.c | |||
| @@ -382,7 +382,6 @@ dtls1_connect(SSL *s) | |||
| 382 | 382 | ||
| 383 | case SSL3_ST_CR_CERT_A: | 383 | case SSL3_ST_CR_CERT_A: |
| 384 | case SSL3_ST_CR_CERT_B: | 384 | case SSL3_ST_CR_CERT_B: |
| 385 | #ifndef OPENSSL_NO_TLSEXT | ||
| 386 | ret = ssl3_check_finished(s); | 385 | ret = ssl3_check_finished(s); |
| 387 | if (ret <= 0) | 386 | if (ret <= 0) |
| 388 | goto end; | 387 | goto end; |
| @@ -395,14 +394,12 @@ dtls1_connect(SSL *s) | |||
| 395 | s->init_num = 0; | 394 | s->init_num = 0; |
| 396 | break; | 395 | break; |
| 397 | } | 396 | } |
| 398 | #endif | ||
| 399 | /* Check if it is anon DH or PSK */ | 397 | /* Check if it is anon DH or PSK */ |
| 400 | if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && | 398 | if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && |
| 401 | !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { | 399 | !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { |
| 402 | ret = ssl3_get_server_certificate(s); | 400 | ret = ssl3_get_server_certificate(s); |
| 403 | if (ret <= 0) | 401 | if (ret <= 0) |
| 404 | goto end; | 402 | goto end; |
| 405 | #ifndef OPENSSL_NO_TLSEXT | ||
| 406 | if (s->tlsext_status_expected) | 403 | if (s->tlsext_status_expected) |
| 407 | s->state = SSL3_ST_CR_CERT_STATUS_A; | 404 | s->state = SSL3_ST_CR_CERT_STATUS_A; |
| 408 | else | 405 | else |
| @@ -411,12 +408,6 @@ dtls1_connect(SSL *s) | |||
| 411 | skip = 1; | 408 | skip = 1; |
| 412 | s->state = SSL3_ST_CR_KEY_EXCH_A; | 409 | s->state = SSL3_ST_CR_KEY_EXCH_A; |
| 413 | } | 410 | } |
| 414 | #else | ||
| 415 | } else | ||
| 416 | skip = 1; | ||
| 417 | |||
| 418 | s->state = SSL3_ST_CR_KEY_EXCH_A; | ||
| 419 | #endif | ||
| 420 | s->init_num = 0; | 411 | s->init_num = 0; |
| 421 | break; | 412 | break; |
| 422 | 413 | ||
| @@ -626,19 +617,16 @@ dtls1_connect(SSL *s) | |||
| 626 | BIO_ctrl(SSL_get_wbio(s), BIO_CTRL_DGRAM_SCTP_NEXT_AUTH_KEY, 0, NULL); | 617 | BIO_ctrl(SSL_get_wbio(s), BIO_CTRL_DGRAM_SCTP_NEXT_AUTH_KEY, 0, NULL); |
| 627 | #endif | 618 | #endif |
| 628 | 619 | ||
| 629 | #ifndef OPENSSL_NO_TLSEXT | ||
| 630 | /* Allow NewSessionTicket if ticket expected */ | 620 | /* Allow NewSessionTicket if ticket expected */ |
| 631 | if (s->tlsext_ticket_expected) | 621 | if (s->tlsext_ticket_expected) |
| 632 | s->s3->tmp.next_state = SSL3_ST_CR_SESSION_TICKET_A; | 622 | s->s3->tmp.next_state = SSL3_ST_CR_SESSION_TICKET_A; |
| 633 | else | 623 | else |
| 634 | #endif | ||
| 635 | 624 | ||
| 636 | s->s3->tmp.next_state = SSL3_ST_CR_FINISHED_A; | 625 | s->s3->tmp.next_state = SSL3_ST_CR_FINISHED_A; |
| 637 | } | 626 | } |
| 638 | s->init_num = 0; | 627 | s->init_num = 0; |
| 639 | break; | 628 | break; |
| 640 | 629 | ||
| 641 | #ifndef OPENSSL_NO_TLSEXT | ||
| 642 | case SSL3_ST_CR_SESSION_TICKET_A: | 630 | case SSL3_ST_CR_SESSION_TICKET_A: |
| 643 | case SSL3_ST_CR_SESSION_TICKET_B: | 631 | case SSL3_ST_CR_SESSION_TICKET_B: |
| 644 | ret = ssl3_get_new_session_ticket(s); | 632 | ret = ssl3_get_new_session_ticket(s); |
| @@ -656,7 +644,6 @@ dtls1_connect(SSL *s) | |||
| 656 | s->state = SSL3_ST_CR_KEY_EXCH_A; | 644 | s->state = SSL3_ST_CR_KEY_EXCH_A; |
| 657 | s->init_num = 0; | 645 | s->init_num = 0; |
| 658 | break; | 646 | break; |
| 659 | #endif | ||
| 660 | 647 | ||
| 661 | case SSL3_ST_CR_FINISHED_A: | 648 | case SSL3_ST_CR_FINISHED_A: |
| 662 | case SSL3_ST_CR_FINISHED_B: | 649 | case SSL3_ST_CR_FINISHED_B: |
| @@ -787,11 +774,7 @@ dtls1_client_hello(SSL *s) | |||
| 787 | SSL_SESSION *sess = s->session; | 774 | SSL_SESSION *sess = s->session; |
| 788 | if ((s->session == NULL) || | 775 | if ((s->session == NULL) || |
| 789 | (s->session->ssl_version != s->version) || | 776 | (s->session->ssl_version != s->version) || |
| 790 | #ifdef OPENSSL_NO_TLSEXT | ||
| 791 | !sess->session_id_length || | ||
| 792 | #else | ||
| 793 | (!sess->session_id_length && !sess->tlsext_tick) || | 777 | (!sess->session_id_length && !sess->tlsext_tick) || |
| 794 | #endif | ||
| 795 | (s->session->not_resumable)) { | 778 | (s->session->not_resumable)) { |
| 796 | if (!ssl_get_new_session(s, 0)) | 779 | if (!ssl_get_new_session(s, 0)) |
| 797 | goto err; | 780 | goto err; |
| @@ -864,12 +847,10 @@ dtls1_client_hello(SSL *s) | |||
| 864 | } | 847 | } |
| 865 | *(p++) = 0; /* Add the NULL method */ | 848 | *(p++) = 0; /* Add the NULL method */ |
| 866 | 849 | ||
| 867 | #ifndef OPENSSL_NO_TLSEXT | ||
| 868 | if ((p = ssl_add_clienthello_tlsext(s, p, buf + SSL3_RT_MAX_PLAIN_LENGTH)) == NULL) { | 850 | if ((p = ssl_add_clienthello_tlsext(s, p, buf + SSL3_RT_MAX_PLAIN_LENGTH)) == NULL) { |
| 869 | SSLerr(SSL_F_DTLS1_CLIENT_HELLO, ERR_R_INTERNAL_ERROR); | 851 | SSLerr(SSL_F_DTLS1_CLIENT_HELLO, ERR_R_INTERNAL_ERROR); |
| 870 | goto err; | 852 | goto err; |
| 871 | } | 853 | } |
| 872 | #endif | ||
| 873 | 854 | ||
| 874 | l = (p - d); | 855 | l = (p - d); |
| 875 | d = buf; | 856 | d = buf; |
