diff options
author | beck <> | 2017-01-23 06:45:30 +0000 |
---|---|---|
committer | beck <> | 2017-01-23 06:45:30 +0000 |
commit | fedd988b9f44e5e0ccf1a340f14354f32800d524 (patch) | |
tree | dfb700c2a3d1498e8069f1fab4c6691ef0f3fef1 /src/lib/libssl/s3_lib.c | |
parent | 3b1c7c5973d7e6aca42940bd4e07900c35d585f5 (diff) | |
download | openbsd-fedd988b9f44e5e0ccf1a340f14354f32800d524.tar.gz openbsd-fedd988b9f44e5e0ccf1a340f14354f32800d524.tar.bz2 openbsd-fedd988b9f44e5e0ccf1a340f14354f32800d524.zip |
Move a large part of ssl_st into internal, so we can see what squeals.
ok jsing@
Diffstat (limited to 'src/lib/libssl/s3_lib.c')
-rw-r--r-- | src/lib/libssl/s3_lib.c | 62 |
1 files changed, 31 insertions, 31 deletions
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c index 3e44d5e4c1..6774557756 100644 --- a/src/lib/libssl/s3_lib.c +++ b/src/lib/libssl/s3_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s3_lib.c,v 1.124 2017/01/23 05:13:02 jsing Exp $ */ | 1 | /* $OpenBSD: s3_lib.c,v 1.125 2017/01/23 06:45:30 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -1697,7 +1697,7 @@ ssl3_handshake_msg_start(SSL *s, uint8_t msg_type) | |||
1697 | { | 1697 | { |
1698 | unsigned char *d, *p; | 1698 | unsigned char *d, *p; |
1699 | 1699 | ||
1700 | d = p = (unsigned char *)s->init_buf->data; | 1700 | d = p = (unsigned char *)s->internal->init_buf->data; |
1701 | 1701 | ||
1702 | /* Handshake message type and length. */ | 1702 | /* Handshake message type and length. */ |
1703 | *(p++) = msg_type; | 1703 | *(p++) = msg_type; |
@@ -1712,14 +1712,14 @@ ssl3_handshake_msg_finish(SSL *s, unsigned int len) | |||
1712 | unsigned char *d, *p; | 1712 | unsigned char *d, *p; |
1713 | uint8_t msg_type; | 1713 | uint8_t msg_type; |
1714 | 1714 | ||
1715 | d = p = (unsigned char *)s->init_buf->data; | 1715 | d = p = (unsigned char *)s->internal->init_buf->data; |
1716 | 1716 | ||
1717 | /* Handshake message length. */ | 1717 | /* Handshake message length. */ |
1718 | msg_type = *(p++); | 1718 | msg_type = *(p++); |
1719 | l2n3(len, p); | 1719 | l2n3(len, p); |
1720 | 1720 | ||
1721 | s->init_num = ssl3_handshake_msg_hdr_len(s) + (int)len; | 1721 | s->internal->init_num = ssl3_handshake_msg_hdr_len(s) + (int)len; |
1722 | s->init_off = 0; | 1722 | s->internal->init_off = 0; |
1723 | 1723 | ||
1724 | if (SSL_IS_DTLS(s)) { | 1724 | if (SSL_IS_DTLS(s)) { |
1725 | dtls1_set_message_header(s, d, msg_type, len, 0, len); | 1725 | dtls1_set_message_header(s, d, msg_type, len, 0, len); |
@@ -1766,13 +1766,13 @@ ssl3_handshake_msg_finish_cbb(SSL *s, CBB *handshake) | |||
1766 | if (outlen > INT_MAX) | 1766 | if (outlen > INT_MAX) |
1767 | goto err; | 1767 | goto err; |
1768 | 1768 | ||
1769 | if (!BUF_MEM_grow_clean(s->init_buf, outlen)) | 1769 | if (!BUF_MEM_grow_clean(s->internal->init_buf, outlen)) |
1770 | goto err; | 1770 | goto err; |
1771 | 1771 | ||
1772 | memcpy(s->init_buf->data, data, outlen); | 1772 | memcpy(s->internal->init_buf->data, data, outlen); |
1773 | 1773 | ||
1774 | s->init_num = (int)outlen; | 1774 | s->internal->init_num = (int)outlen; |
1775 | s->init_off = 0; | 1775 | s->internal->init_off = 0; |
1776 | 1776 | ||
1777 | if (SSL_IS_DTLS(s)) { | 1777 | if (SSL_IS_DTLS(s)) { |
1778 | unsigned long len; | 1778 | unsigned long len; |
@@ -1905,7 +1905,7 @@ ssl3_clear(SSL *s) | |||
1905 | S3I(s)->num_renegotiations = 0; | 1905 | S3I(s)->num_renegotiations = 0; |
1906 | S3I(s)->in_read_app_data = 0; | 1906 | S3I(s)->in_read_app_data = 0; |
1907 | 1907 | ||
1908 | s->packet_length = 0; | 1908 | s->internal->packet_length = 0; |
1909 | s->version = TLS1_VERSION; | 1909 | s->version = TLS1_VERSION; |
1910 | 1910 | ||
1911 | free(s->internal->next_proto_negotiated); | 1911 | free(s->internal->next_proto_negotiated); |
@@ -1990,7 +1990,7 @@ ssl3_ctrl(SSL *s, int cmd, long larg, void *parg) | |||
1990 | 1990 | ||
1991 | switch (cmd) { | 1991 | switch (cmd) { |
1992 | case SSL_CTRL_GET_SESSION_REUSED: | 1992 | case SSL_CTRL_GET_SESSION_REUSED: |
1993 | ret = s->hit; | 1993 | ret = s->internal->hit; |
1994 | break; | 1994 | break; |
1995 | case SSL_CTRL_GET_CLIENT_CERT_REQUEST: | 1995 | case SSL_CTRL_GET_CLIENT_CERT_REQUEST: |
1996 | break; | 1996 | break; |
@@ -2112,33 +2112,33 @@ ssl3_ctrl(SSL *s, int cmd, long larg, void *parg) | |||
2112 | break; | 2112 | break; |
2113 | 2113 | ||
2114 | case SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS: | 2114 | case SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS: |
2115 | *(STACK_OF(X509_EXTENSION) **)parg = s->tlsext_ocsp_exts; | 2115 | *(STACK_OF(X509_EXTENSION) **)parg = s->internal->tlsext_ocsp_exts; |
2116 | ret = 1; | 2116 | ret = 1; |
2117 | break; | 2117 | break; |
2118 | 2118 | ||
2119 | case SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS: | 2119 | case SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS: |
2120 | s->tlsext_ocsp_exts = parg; | 2120 | s->internal->tlsext_ocsp_exts = parg; |
2121 | ret = 1; | 2121 | ret = 1; |
2122 | break; | 2122 | break; |
2123 | 2123 | ||
2124 | case SSL_CTRL_GET_TLSEXT_STATUS_REQ_IDS: | 2124 | case SSL_CTRL_GET_TLSEXT_STATUS_REQ_IDS: |
2125 | *(STACK_OF(OCSP_RESPID) **)parg = s->tlsext_ocsp_ids; | 2125 | *(STACK_OF(OCSP_RESPID) **)parg = s->internal->tlsext_ocsp_ids; |
2126 | ret = 1; | 2126 | ret = 1; |
2127 | break; | 2127 | break; |
2128 | 2128 | ||
2129 | case SSL_CTRL_SET_TLSEXT_STATUS_REQ_IDS: | 2129 | case SSL_CTRL_SET_TLSEXT_STATUS_REQ_IDS: |
2130 | s->tlsext_ocsp_ids = parg; | 2130 | s->internal->tlsext_ocsp_ids = parg; |
2131 | ret = 1; | 2131 | ret = 1; |
2132 | break; | 2132 | break; |
2133 | 2133 | ||
2134 | case SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP: | 2134 | case SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP: |
2135 | *(unsigned char **)parg = s->tlsext_ocsp_resp; | 2135 | *(unsigned char **)parg = s->internal->tlsext_ocsp_resp; |
2136 | return s->tlsext_ocsp_resplen; | 2136 | return s->internal->tlsext_ocsp_resplen; |
2137 | 2137 | ||
2138 | case SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP: | 2138 | case SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP: |
2139 | free(s->tlsext_ocsp_resp); | 2139 | free(s->internal->tlsext_ocsp_resp); |
2140 | s->tlsext_ocsp_resp = parg; | 2140 | s->internal->tlsext_ocsp_resp = parg; |
2141 | s->tlsext_ocsp_resplen = larg; | 2141 | s->internal->tlsext_ocsp_resplen = larg; |
2142 | ret = 1; | 2142 | ret = 1; |
2143 | break; | 2143 | break; |
2144 | 2144 | ||
@@ -2505,13 +2505,13 @@ ssl3_shutdown(SSL *s) | |||
2505 | * Don't do anything much if we have not done the handshake or | 2505 | * Don't do anything much if we have not done the handshake or |
2506 | * we don't want to send messages :-) | 2506 | * we don't want to send messages :-) |
2507 | */ | 2507 | */ |
2508 | if ((s->quiet_shutdown) || (s->state == SSL_ST_BEFORE)) { | 2508 | if ((s->internal->quiet_shutdown) || (s->state == SSL_ST_BEFORE)) { |
2509 | s->shutdown = (SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN); | 2509 | s->internal->shutdown = (SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN); |
2510 | return (1); | 2510 | return (1); |
2511 | } | 2511 | } |
2512 | 2512 | ||
2513 | if (!(s->shutdown & SSL_SENT_SHUTDOWN)) { | 2513 | if (!(s->internal->shutdown & SSL_SENT_SHUTDOWN)) { |
2514 | s->shutdown|=SSL_SENT_SHUTDOWN; | 2514 | s->internal->shutdown|=SSL_SENT_SHUTDOWN; |
2515 | ssl3_send_alert(s, SSL3_AL_WARNING, SSL_AD_CLOSE_NOTIFY); | 2515 | ssl3_send_alert(s, SSL3_AL_WARNING, SSL_AD_CLOSE_NOTIFY); |
2516 | /* | 2516 | /* |
2517 | * Our shutdown alert has been sent now, and if it still needs | 2517 | * Our shutdown alert has been sent now, and if it still needs |
@@ -2531,15 +2531,15 @@ ssl3_shutdown(SSL *s) | |||
2531 | */ | 2531 | */ |
2532 | return (ret); | 2532 | return (ret); |
2533 | } | 2533 | } |
2534 | } else if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) { | 2534 | } else if (!(s->internal->shutdown & SSL_RECEIVED_SHUTDOWN)) { |
2535 | /* If we are waiting for a close from our peer, we are closed */ | 2535 | /* If we are waiting for a close from our peer, we are closed */ |
2536 | s->method->ssl_read_bytes(s, 0, NULL, 0, 0); | 2536 | s->method->ssl_read_bytes(s, 0, NULL, 0, 0); |
2537 | if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) { | 2537 | if (!(s->internal->shutdown & SSL_RECEIVED_SHUTDOWN)) { |
2538 | return(-1); /* return WANT_READ */ | 2538 | return(-1); /* return WANT_READ */ |
2539 | } | 2539 | } |
2540 | } | 2540 | } |
2541 | 2541 | ||
2542 | if ((s->shutdown == (SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN)) && | 2542 | if ((s->internal->shutdown == (SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN)) && |
2543 | !s->s3->alert_dispatch) | 2543 | !s->s3->alert_dispatch) |
2544 | return (1); | 2544 | return (1); |
2545 | else | 2545 | else |
@@ -2552,8 +2552,8 @@ ssl3_write(SSL *s, const void *buf, int len) | |||
2552 | int ret, n; | 2552 | int ret, n; |
2553 | 2553 | ||
2554 | #if 0 | 2554 | #if 0 |
2555 | if (s->shutdown & SSL_SEND_SHUTDOWN) { | 2555 | if (s->internal->shutdown & SSL_SEND_SHUTDOWN) { |
2556 | s->rwstate = SSL_NOTHING; | 2556 | s->internal->rwstate = SSL_NOTHING; |
2557 | return (0); | 2557 | return (0); |
2558 | } | 2558 | } |
2559 | #endif | 2559 | #endif |
@@ -2579,11 +2579,11 @@ ssl3_write(SSL *s, const void *buf, int len) | |||
2579 | S3I(s)->delay_buf_pop_ret = ret; | 2579 | S3I(s)->delay_buf_pop_ret = ret; |
2580 | } | 2580 | } |
2581 | 2581 | ||
2582 | s->rwstate = SSL_WRITING; | 2582 | s->internal->rwstate = SSL_WRITING; |
2583 | n = BIO_flush(s->wbio); | 2583 | n = BIO_flush(s->wbio); |
2584 | if (n <= 0) | 2584 | if (n <= 0) |
2585 | return (n); | 2585 | return (n); |
2586 | s->rwstate = SSL_NOTHING; | 2586 | s->internal->rwstate = SSL_NOTHING; |
2587 | 2587 | ||
2588 | /* We have flushed the buffer, so remove it */ | 2588 | /* We have flushed the buffer, so remove it */ |
2589 | ssl_free_wbio_buffer(s); | 2589 | ssl_free_wbio_buffer(s); |