diff options
author | beck <> | 2017-01-23 04:55:27 +0000 |
---|---|---|
committer | beck <> | 2017-01-23 04:55:27 +0000 |
commit | c35f51566045be89c49b0a47e153fdb27ec20f8e (patch) | |
tree | 7b3e30aaa4ce396a0dcc28cc981628a669ff50d2 /src/lib/libssl/s3_lib.c | |
parent | 0f157a9ac8d269cb234cff4f5cd07800027490ff (diff) | |
download | openbsd-c35f51566045be89c49b0a47e153fdb27ec20f8e.tar.gz openbsd-c35f51566045be89c49b0a47e153fdb27ec20f8e.tar.bz2 openbsd-c35f51566045be89c49b0a47e153fdb27ec20f8e.zip |
move the callbacks from ssl_st to internal
ok jsing@
Diffstat (limited to 'src/lib/libssl/s3_lib.c')
-rw-r--r-- | src/lib/libssl/s3_lib.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c index 92f4c49aa8..8e52c8bb4a 100644 --- a/src/lib/libssl/s3_lib.c +++ b/src/lib/libssl/s3_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s3_lib.c,v 1.122 2017/01/23 04:15:28 jsing Exp $ */ | 1 | /* $OpenBSD: s3_lib.c,v 1.123 2017/01/23 04:55:26 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -2102,7 +2102,7 @@ ssl3_ctrl(SSL *s, int cmd, long larg, void *parg) | |||
2102 | } | 2102 | } |
2103 | break; | 2103 | break; |
2104 | case SSL_CTRL_SET_TLSEXT_DEBUG_ARG: | 2104 | case SSL_CTRL_SET_TLSEXT_DEBUG_ARG: |
2105 | s->tlsext_debug_arg = parg; | 2105 | s->internal->tlsext_debug_arg = parg; |
2106 | ret = 1; | 2106 | ret = 1; |
2107 | break; | 2107 | break; |
2108 | 2108 | ||
@@ -2181,7 +2181,7 @@ ssl3_callback_ctrl(SSL *s, int cmd, void (*fp)(void)) | |||
2181 | s->cert->ecdh_tmp_cb = (EC_KEY *(*)(SSL *, int, int))fp; | 2181 | s->cert->ecdh_tmp_cb = (EC_KEY *(*)(SSL *, int, int))fp; |
2182 | break; | 2182 | break; |
2183 | case SSL_CTRL_SET_TLSEXT_DEBUG_CB: | 2183 | case SSL_CTRL_SET_TLSEXT_DEBUG_CB: |
2184 | s->tlsext_debug_cb = (void (*)(SSL *, int , int, | 2184 | s->internal->tlsext_debug_cb = (void (*)(SSL *, int , int, |
2185 | unsigned char *, int, void *))fp; | 2185 | unsigned char *, int, void *))fp; |
2186 | break; | 2186 | break; |
2187 | default: | 2187 | default: |
@@ -2614,16 +2614,16 @@ ssl3_read_internal(SSL *s, void *buf, int len, int peek) | |||
2614 | SSL3_RT_APPLICATION_DATA, buf, len, peek); | 2614 | SSL3_RT_APPLICATION_DATA, buf, len, peek); |
2615 | if ((ret == -1) && (S3I(s)->in_read_app_data == 2)) { | 2615 | if ((ret == -1) && (S3I(s)->in_read_app_data == 2)) { |
2616 | /* | 2616 | /* |
2617 | * ssl3_read_bytes decided to call s->handshake_func, which | 2617 | * ssl3_read_bytes decided to call s->internal->handshake_func, which |
2618 | * called ssl3_read_bytes to read handshake data. | 2618 | * called ssl3_read_bytes to read handshake data. |
2619 | * However, ssl3_read_bytes actually found application data | 2619 | * However, ssl3_read_bytes actually found application data |
2620 | * and thinks that application data makes sense here; so disable | 2620 | * and thinks that application data makes sense here; so disable |
2621 | * handshake processing and try to read application data again. | 2621 | * handshake processing and try to read application data again. |
2622 | */ | 2622 | */ |
2623 | s->in_handshake++; | 2623 | s->internal->in_handshake++; |
2624 | ret = s->method->ssl_read_bytes(s, | 2624 | ret = s->method->ssl_read_bytes(s, |
2625 | SSL3_RT_APPLICATION_DATA, buf, len, peek); | 2625 | SSL3_RT_APPLICATION_DATA, buf, len, peek); |
2626 | s->in_handshake--; | 2626 | s->internal->in_handshake--; |
2627 | } else | 2627 | } else |
2628 | S3I(s)->in_read_app_data = 0; | 2628 | S3I(s)->in_read_app_data = 0; |
2629 | 2629 | ||
@@ -2645,7 +2645,7 @@ ssl3_peek(SSL *s, void *buf, int len) | |||
2645 | int | 2645 | int |
2646 | ssl3_renegotiate(SSL *s) | 2646 | ssl3_renegotiate(SSL *s) |
2647 | { | 2647 | { |
2648 | if (s->handshake_func == NULL) | 2648 | if (s->internal->handshake_func == NULL) |
2649 | return (1); | 2649 | return (1); |
2650 | 2650 | ||
2651 | if (s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS) | 2651 | if (s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS) |