diff options
author | beck <> | 2017-01-22 07:16:39 +0000 |
---|---|---|
committer | beck <> | 2017-01-22 07:16:39 +0000 |
commit | 2204d5a39055900d89c6f7fbdcc3bb37ec8070db (patch) | |
tree | c03f505a3f0822dbc7a4d9523cfde19318c0d121 /src/lib/libssl/d1_clnt.c | |
parent | 334c9196a27db4244daba48e4ba2118985c535ed (diff) | |
download | openbsd-2204d5a39055900d89c6f7fbdcc3bb37ec8070db.tar.gz openbsd-2204d5a39055900d89c6f7fbdcc3bb37ec8070db.tar.bz2 openbsd-2204d5a39055900d89c6f7fbdcc3bb37ec8070db.zip |
Move most of DTLS1_STATE to internal.
ok jsing@
Diffstat (limited to 'src/lib/libssl/d1_clnt.c')
-rw-r--r-- | src/lib/libssl/d1_clnt.c | 26 |
1 files changed, 13 insertions, 13 deletions
diff --git a/src/lib/libssl/d1_clnt.c b/src/lib/libssl/d1_clnt.c index 633eabf8b4..d4b8031150 100644 --- a/src/lib/libssl/d1_clnt.c +++ b/src/lib/libssl/d1_clnt.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: d1_clnt.c,v 1.60 2017/01/21 06:50:02 jsing Exp $ */ | 1 | /* $OpenBSD: d1_clnt.c,v 1.61 2017/01/22 07:16:38 beck Exp $ */ |
2 | /* | 2 | /* |
3 | * DTLS implementation written by Nagendra Modadugu | 3 | * DTLS implementation written by Nagendra Modadugu |
4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. | 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. |
@@ -247,7 +247,7 @@ dtls1_connect(SSL *s) | |||
247 | /* mark client_random uninitialized */ | 247 | /* mark client_random uninitialized */ |
248 | memset(s->s3->client_random, 0, | 248 | memset(s->s3->client_random, 0, |
249 | sizeof(s->s3->client_random)); | 249 | sizeof(s->s3->client_random)); |
250 | s->d1->send_cookie = 0; | 250 | D1I(s)->send_cookie = 0; |
251 | s->hit = 0; | 251 | s->hit = 0; |
252 | break; | 252 | break; |
253 | 253 | ||
@@ -268,7 +268,7 @@ dtls1_connect(SSL *s) | |||
268 | if (ret <= 0) | 268 | if (ret <= 0) |
269 | goto end; | 269 | goto end; |
270 | 270 | ||
271 | if (s->d1->send_cookie) { | 271 | if (D1I(s)->send_cookie) { |
272 | s->state = SSL3_ST_CW_FLUSH; | 272 | s->state = SSL3_ST_CW_FLUSH; |
273 | s->s3->tmp.next_state = SSL3_ST_CR_SRVR_HELLO_A; | 273 | s->s3->tmp.next_state = SSL3_ST_CR_SRVR_HELLO_A; |
274 | } else | 274 | } else |
@@ -304,7 +304,7 @@ dtls1_connect(SSL *s) | |||
304 | if (ret <= 0) | 304 | if (ret <= 0) |
305 | goto end; | 305 | goto end; |
306 | dtls1_stop_timer(s); | 306 | dtls1_stop_timer(s); |
307 | if ( s->d1->send_cookie) /* start again, with a cookie */ | 307 | if ( D1I(s)->send_cookie) /* start again, with a cookie */ |
308 | s->state = SSL3_ST_CW_CLNT_HELLO_A; | 308 | s->state = SSL3_ST_CW_CLNT_HELLO_A; |
309 | else | 309 | else |
310 | s->state = SSL3_ST_CR_CERT_A; | 310 | s->state = SSL3_ST_CR_CERT_A; |
@@ -507,7 +507,7 @@ dtls1_connect(SSL *s) | |||
507 | 507 | ||
508 | case SSL3_ST_CR_FINISHED_A: | 508 | case SSL3_ST_CR_FINISHED_A: |
509 | case SSL3_ST_CR_FINISHED_B: | 509 | case SSL3_ST_CR_FINISHED_B: |
510 | s->d1->change_cipher_spec_ok = 1; | 510 | D1I(s)->change_cipher_spec_ok = 1; |
511 | ret = ssl3_get_finished(s, SSL3_ST_CR_FINISHED_A, | 511 | ret = ssl3_get_finished(s, SSL3_ST_CR_FINISHED_A, |
512 | SSL3_ST_CR_FINISHED_B); | 512 | SSL3_ST_CR_FINISHED_B); |
513 | if (ret <= 0) | 513 | if (ret <= 0) |
@@ -566,8 +566,8 @@ dtls1_connect(SSL *s) | |||
566 | cb(s, SSL_CB_HANDSHAKE_DONE, 1); | 566 | cb(s, SSL_CB_HANDSHAKE_DONE, 1); |
567 | 567 | ||
568 | /* done with handshaking */ | 568 | /* done with handshaking */ |
569 | s->d1->handshake_read_seq = 0; | 569 | D1I(s)->handshake_read_seq = 0; |
570 | s->d1->next_handshake_write_seq = 0; | 570 | D1I(s)->next_handshake_write_seq = 0; |
571 | goto end; | 571 | goto end; |
572 | /* break; */ | 572 | /* break; */ |
573 | 573 | ||
@@ -619,7 +619,7 @@ dtls1_get_hello_verify(SSL *s) | |||
619 | return ((int)n); | 619 | return ((int)n); |
620 | 620 | ||
621 | if (s->s3->tmp.message_type != DTLS1_MT_HELLO_VERIFY_REQUEST) { | 621 | if (s->s3->tmp.message_type != DTLS1_MT_HELLO_VERIFY_REQUEST) { |
622 | s->d1->send_cookie = 0; | 622 | D1I(s)->send_cookie = 0; |
623 | s->s3->tmp.reuse_message = 1; | 623 | s->s3->tmp.reuse_message = 1; |
624 | return (1); | 624 | return (1); |
625 | } | 625 | } |
@@ -642,14 +642,14 @@ dtls1_get_hello_verify(SSL *s) | |||
642 | if (!CBS_get_u8_length_prefixed(&hello_verify_request, &cookie)) | 642 | if (!CBS_get_u8_length_prefixed(&hello_verify_request, &cookie)) |
643 | goto truncated; | 643 | goto truncated; |
644 | 644 | ||
645 | if (!CBS_write_bytes(&cookie, s->d1->cookie, | 645 | if (!CBS_write_bytes(&cookie, D1I(s)->cookie, |
646 | sizeof(s->d1->cookie), &cookie_len)) { | 646 | sizeof(D1I(s)->cookie), &cookie_len)) { |
647 | s->d1->cookie_len = 0; | 647 | D1I(s)->cookie_len = 0; |
648 | al = SSL_AD_ILLEGAL_PARAMETER; | 648 | al = SSL_AD_ILLEGAL_PARAMETER; |
649 | goto f_err; | 649 | goto f_err; |
650 | } | 650 | } |
651 | s->d1->cookie_len = cookie_len; | 651 | D1I(s)->cookie_len = cookie_len; |
652 | s->d1->send_cookie = 1; | 652 | D1I(s)->send_cookie = 1; |
653 | 653 | ||
654 | return 1; | 654 | return 1; |
655 | 655 | ||