summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_clnt.c
diff options
context:
space:
mode:
authorjsing <>2017-01-23 01:22:08 +0000
committerjsing <>2017-01-23 01:22:08 +0000
commitfdee32bae021d93d570e88a1dbbea0b3bad2c1e0 (patch)
tree0516913107a84da915d173ba7ce7df2e5e964a93 /src/lib/libssl/s3_clnt.c
parenta52552c2ca63345dc67023aa087ad6048779e0d3 (diff)
downloadopenbsd-fdee32bae021d93d570e88a1dbbea0b3bad2c1e0.tar.gz
openbsd-fdee32bae021d93d570e88a1dbbea0b3bad2c1e0.tar.bz2
openbsd-fdee32bae021d93d570e88a1dbbea0b3bad2c1e0.zip
Move not_resumable and sess_cert from SSL_SESSION to internal.
ok beck@
Diffstat (limited to 'src/lib/libssl/s3_clnt.c')
-rw-r--r--src/lib/libssl/s3_clnt.c38
1 files changed, 19 insertions, 19 deletions
diff --git a/src/lib/libssl/s3_clnt.c b/src/lib/libssl/s3_clnt.c
index 18e34f7b7b..2c272032b5 100644
--- a/src/lib/libssl/s3_clnt.c
+++ b/src/lib/libssl/s3_clnt.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: s3_clnt.c,v 1.163 2017/01/23 00:12:54 jsing Exp $ */ 1/* $OpenBSD: s3_clnt.c,v 1.164 2017/01/23 01:22:08 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -600,7 +600,7 @@ ssl3_client_hello(SSL *s)
600 if ((sess == NULL) || 600 if ((sess == NULL) ||
601 (sess->ssl_version != s->version) || 601 (sess->ssl_version != s->version) ||
602 (!sess->session_id_length && !sess->tlsext_tick) || 602 (!sess->session_id_length && !sess->tlsext_tick) ||
603 (sess->not_resumable)) { 603 (sess->internal->not_resumable)) {
604 if (!ssl_get_new_session(s, 0)) 604 if (!ssl_get_new_session(s, 0))
605 goto err; 605 goto err;
606 } 606 }
@@ -1037,9 +1037,9 @@ ssl3_get_server_certificate(SSL *s)
1037 sc = ssl_sess_cert_new(); 1037 sc = ssl_sess_cert_new();
1038 if (sc == NULL) 1038 if (sc == NULL)
1039 goto err; 1039 goto err;
1040 if (s->session->sess_cert) 1040 if (SSI(s)->sess_cert)
1041 ssl_sess_cert_free(s->session->sess_cert); 1041 ssl_sess_cert_free(SSI(s)->sess_cert);
1042 s->session->sess_cert = sc; 1042 SSI(s)->sess_cert = sc;
1043 1043
1044 sc->cert_chain = sk; 1044 sc->cert_chain = sk;
1045 /* 1045 /*
@@ -1114,7 +1114,7 @@ ssl3_get_server_kex_dhe(SSL *s, EVP_PKEY **pkey, unsigned char **pp, long *nn)
1114 int al; 1114 int al;
1115 1115
1116 alg_a = S3I(s)->tmp.new_cipher->algorithm_auth; 1116 alg_a = S3I(s)->tmp.new_cipher->algorithm_auth;
1117 sc = s->session->sess_cert; 1117 sc = SSI(s)->sess_cert;
1118 1118
1119 if (*nn < 0) 1119 if (*nn < 0)
1120 goto err; 1120 goto err;
@@ -1281,7 +1281,7 @@ ssl3_get_server_kex_ecdhe(SSL *s, EVP_PKEY **pkey, unsigned char **pp, long *nn)
1281 int al; 1281 int al;
1282 1282
1283 alg_a = S3I(s)->tmp.new_cipher->algorithm_auth; 1283 alg_a = S3I(s)->tmp.new_cipher->algorithm_auth;
1284 sc = s->session->sess_cert; 1284 sc = SSI(s)->sess_cert;
1285 1285
1286 if (*nn < 0) 1286 if (*nn < 0)
1287 goto err; 1287 goto err;
@@ -1397,18 +1397,18 @@ ssl3_get_server_key_exchange(SSL *s)
1397 return (1); 1397 return (1);
1398 } 1398 }
1399 1399
1400 if (s->session->sess_cert != NULL) { 1400 if (SSI(s)->sess_cert != NULL) {
1401 DH_free(s->session->sess_cert->peer_dh_tmp); 1401 DH_free(SSI(s)->sess_cert->peer_dh_tmp);
1402 s->session->sess_cert->peer_dh_tmp = NULL; 1402 SSI(s)->sess_cert->peer_dh_tmp = NULL;
1403 1403
1404 EC_KEY_free(s->session->sess_cert->peer_ecdh_tmp); 1404 EC_KEY_free(SSI(s)->sess_cert->peer_ecdh_tmp);
1405 s->session->sess_cert->peer_ecdh_tmp = NULL; 1405 SSI(s)->sess_cert->peer_ecdh_tmp = NULL;
1406 1406
1407 free(s->session->sess_cert->peer_x25519_tmp); 1407 free(SSI(s)->sess_cert->peer_x25519_tmp);
1408 s->session->sess_cert->peer_x25519_tmp = NULL; 1408 SSI(s)->sess_cert->peer_x25519_tmp = NULL;
1409 } else { 1409 } else {
1410 s->session->sess_cert = ssl_sess_cert_new(); 1410 SSI(s)->sess_cert = ssl_sess_cert_new();
1411 if (s->session->sess_cert == NULL) 1411 if (SSI(s)->sess_cert == NULL)
1412 goto err; 1412 goto err;
1413 } 1413 }
1414 1414
@@ -2341,7 +2341,7 @@ ssl3_send_client_key_exchange(SSL *s)
2341 if (s->state == SSL3_ST_CW_KEY_EXCH_A) { 2341 if (s->state == SSL3_ST_CW_KEY_EXCH_A) {
2342 alg_k = S3I(s)->tmp.new_cipher->algorithm_mkey; 2342 alg_k = S3I(s)->tmp.new_cipher->algorithm_mkey;
2343 2343
2344 if ((sess_cert = s->session->sess_cert) == NULL) { 2344 if ((sess_cert = SSI(s)->sess_cert) == NULL) {
2345 ssl3_send_alert(s, SSL3_AL_FATAL, 2345 ssl3_send_alert(s, SSL3_AL_FATAL,
2346 SSL_AD_UNEXPECTED_MESSAGE); 2346 SSL_AD_UNEXPECTED_MESSAGE);
2347 SSLerr(SSL_F_SSL3_SEND_CLIENT_KEY_EXCHANGE, 2347 SSLerr(SSL_F_SSL3_SEND_CLIENT_KEY_EXCHANGE,
@@ -2636,13 +2636,13 @@ ssl3_check_cert_and_algorithm(SSL *s)
2636 if (alg_a & SSL_aNULL) 2636 if (alg_a & SSL_aNULL)
2637 return (1); 2637 return (1);
2638 2638
2639 sc = s->session->sess_cert; 2639 sc = SSI(s)->sess_cert;
2640 if (sc == NULL) { 2640 if (sc == NULL) {
2641 SSLerr(SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM, 2641 SSLerr(SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM,
2642 ERR_R_INTERNAL_ERROR); 2642 ERR_R_INTERNAL_ERROR);
2643 goto err; 2643 goto err;
2644 } 2644 }
2645 dh = s->session->sess_cert->peer_dh_tmp; 2645 dh = SSI(s)->sess_cert->peer_dh_tmp;
2646 2646
2647 /* This is the passed certificate. */ 2647 /* This is the passed certificate. */
2648 2648