summaryrefslogtreecommitdiff
path: root/src/lib/libssl/d1_clnt.c
diff options
context:
space:
mode:
authorbeck <>2017-01-22 07:16:39 +0000
committerbeck <>2017-01-22 07:16:39 +0000
commit2204d5a39055900d89c6f7fbdcc3bb37ec8070db (patch)
treec03f505a3f0822dbc7a4d9523cfde19318c0d121 /src/lib/libssl/d1_clnt.c
parent334c9196a27db4244daba48e4ba2118985c535ed (diff)
downloadopenbsd-2204d5a39055900d89c6f7fbdcc3bb37ec8070db.tar.gz
openbsd-2204d5a39055900d89c6f7fbdcc3bb37ec8070db.tar.bz2
openbsd-2204d5a39055900d89c6f7fbdcc3bb37ec8070db.zip
Move most of DTLS1_STATE to internal.
ok jsing@
Diffstat (limited to 'src/lib/libssl/d1_clnt.c')
-rw-r--r--src/lib/libssl/d1_clnt.c26
1 files changed, 13 insertions, 13 deletions
diff --git a/src/lib/libssl/d1_clnt.c b/src/lib/libssl/d1_clnt.c
index 633eabf8b4..d4b8031150 100644
--- a/src/lib/libssl/d1_clnt.c
+++ b/src/lib/libssl/d1_clnt.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: d1_clnt.c,v 1.60 2017/01/21 06:50:02 jsing Exp $ */ 1/* $OpenBSD: d1_clnt.c,v 1.61 2017/01/22 07:16:38 beck Exp $ */
2/* 2/*
3 * DTLS implementation written by Nagendra Modadugu 3 * DTLS implementation written by Nagendra Modadugu
4 * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. 4 * (nagendra@cs.stanford.edu) for the OpenSSL project 2005.
@@ -247,7 +247,7 @@ dtls1_connect(SSL *s)
247 /* mark client_random uninitialized */ 247 /* mark client_random uninitialized */
248 memset(s->s3->client_random, 0, 248 memset(s->s3->client_random, 0,
249 sizeof(s->s3->client_random)); 249 sizeof(s->s3->client_random));
250 s->d1->send_cookie = 0; 250 D1I(s)->send_cookie = 0;
251 s->hit = 0; 251 s->hit = 0;
252 break; 252 break;
253 253
@@ -268,7 +268,7 @@ dtls1_connect(SSL *s)
268 if (ret <= 0) 268 if (ret <= 0)
269 goto end; 269 goto end;
270 270
271 if (s->d1->send_cookie) { 271 if (D1I(s)->send_cookie) {
272 s->state = SSL3_ST_CW_FLUSH; 272 s->state = SSL3_ST_CW_FLUSH;
273 s->s3->tmp.next_state = SSL3_ST_CR_SRVR_HELLO_A; 273 s->s3->tmp.next_state = SSL3_ST_CR_SRVR_HELLO_A;
274 } else 274 } else
@@ -304,7 +304,7 @@ dtls1_connect(SSL *s)
304 if (ret <= 0) 304 if (ret <= 0)
305 goto end; 305 goto end;
306 dtls1_stop_timer(s); 306 dtls1_stop_timer(s);
307 if ( s->d1->send_cookie) /* start again, with a cookie */ 307 if ( D1I(s)->send_cookie) /* start again, with a cookie */
308 s->state = SSL3_ST_CW_CLNT_HELLO_A; 308 s->state = SSL3_ST_CW_CLNT_HELLO_A;
309 else 309 else
310 s->state = SSL3_ST_CR_CERT_A; 310 s->state = SSL3_ST_CR_CERT_A;
@@ -507,7 +507,7 @@ dtls1_connect(SSL *s)
507 507
508 case SSL3_ST_CR_FINISHED_A: 508 case SSL3_ST_CR_FINISHED_A:
509 case SSL3_ST_CR_FINISHED_B: 509 case SSL3_ST_CR_FINISHED_B:
510 s->d1->change_cipher_spec_ok = 1; 510 D1I(s)->change_cipher_spec_ok = 1;
511 ret = ssl3_get_finished(s, SSL3_ST_CR_FINISHED_A, 511 ret = ssl3_get_finished(s, SSL3_ST_CR_FINISHED_A,
512 SSL3_ST_CR_FINISHED_B); 512 SSL3_ST_CR_FINISHED_B);
513 if (ret <= 0) 513 if (ret <= 0)
@@ -566,8 +566,8 @@ dtls1_connect(SSL *s)
566 cb(s, SSL_CB_HANDSHAKE_DONE, 1); 566 cb(s, SSL_CB_HANDSHAKE_DONE, 1);
567 567
568 /* done with handshaking */ 568 /* done with handshaking */
569 s->d1->handshake_read_seq = 0; 569 D1I(s)->handshake_read_seq = 0;
570 s->d1->next_handshake_write_seq = 0; 570 D1I(s)->next_handshake_write_seq = 0;
571 goto end; 571 goto end;
572 /* break; */ 572 /* break; */
573 573
@@ -619,7 +619,7 @@ dtls1_get_hello_verify(SSL *s)
619 return ((int)n); 619 return ((int)n);
620 620
621 if (s->s3->tmp.message_type != DTLS1_MT_HELLO_VERIFY_REQUEST) { 621 if (s->s3->tmp.message_type != DTLS1_MT_HELLO_VERIFY_REQUEST) {
622 s->d1->send_cookie = 0; 622 D1I(s)->send_cookie = 0;
623 s->s3->tmp.reuse_message = 1; 623 s->s3->tmp.reuse_message = 1;
624 return (1); 624 return (1);
625 } 625 }
@@ -642,14 +642,14 @@ dtls1_get_hello_verify(SSL *s)
642 if (!CBS_get_u8_length_prefixed(&hello_verify_request, &cookie)) 642 if (!CBS_get_u8_length_prefixed(&hello_verify_request, &cookie))
643 goto truncated; 643 goto truncated;
644 644
645 if (!CBS_write_bytes(&cookie, s->d1->cookie, 645 if (!CBS_write_bytes(&cookie, D1I(s)->cookie,
646 sizeof(s->d1->cookie), &cookie_len)) { 646 sizeof(D1I(s)->cookie), &cookie_len)) {
647 s->d1->cookie_len = 0; 647 D1I(s)->cookie_len = 0;
648 al = SSL_AD_ILLEGAL_PARAMETER; 648 al = SSL_AD_ILLEGAL_PARAMETER;
649 goto f_err; 649 goto f_err;
650 } 650 }
651 s->d1->cookie_len = cookie_len; 651 D1I(s)->cookie_len = cookie_len;
652 s->d1->send_cookie = 1; 652 D1I(s)->send_cookie = 1;
653 653
654 return 1; 654 return 1;
655 655