summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_lib.c
diff options
context:
space:
mode:
authorbeck <>2017-01-23 06:45:30 +0000
committerbeck <>2017-01-23 06:45:30 +0000
commitfedd988b9f44e5e0ccf1a340f14354f32800d524 (patch)
treedfb700c2a3d1498e8069f1fab4c6691ef0f3fef1 /src/lib/libssl/s3_lib.c
parent3b1c7c5973d7e6aca42940bd4e07900c35d585f5 (diff)
downloadopenbsd-fedd988b9f44e5e0ccf1a340f14354f32800d524.tar.gz
openbsd-fedd988b9f44e5e0ccf1a340f14354f32800d524.tar.bz2
openbsd-fedd988b9f44e5e0ccf1a340f14354f32800d524.zip
Move a large part of ssl_st into internal, so we can see what squeals.
ok jsing@
Diffstat (limited to 'src/lib/libssl/s3_lib.c')
-rw-r--r--src/lib/libssl/s3_lib.c62
1 files changed, 31 insertions, 31 deletions
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c
index 3e44d5e4c1..6774557756 100644
--- a/src/lib/libssl/s3_lib.c
+++ b/src/lib/libssl/s3_lib.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: s3_lib.c,v 1.124 2017/01/23 05:13:02 jsing Exp $ */ 1/* $OpenBSD: s3_lib.c,v 1.125 2017/01/23 06:45:30 beck Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -1697,7 +1697,7 @@ ssl3_handshake_msg_start(SSL *s, uint8_t msg_type)
1697{ 1697{
1698 unsigned char *d, *p; 1698 unsigned char *d, *p;
1699 1699
1700 d = p = (unsigned char *)s->init_buf->data; 1700 d = p = (unsigned char *)s->internal->init_buf->data;
1701 1701
1702 /* Handshake message type and length. */ 1702 /* Handshake message type and length. */
1703 *(p++) = msg_type; 1703 *(p++) = msg_type;
@@ -1712,14 +1712,14 @@ ssl3_handshake_msg_finish(SSL *s, unsigned int len)
1712 unsigned char *d, *p; 1712 unsigned char *d, *p;
1713 uint8_t msg_type; 1713 uint8_t msg_type;
1714 1714
1715 d = p = (unsigned char *)s->init_buf->data; 1715 d = p = (unsigned char *)s->internal->init_buf->data;
1716 1716
1717 /* Handshake message length. */ 1717 /* Handshake message length. */
1718 msg_type = *(p++); 1718 msg_type = *(p++);
1719 l2n3(len, p); 1719 l2n3(len, p);
1720 1720
1721 s->init_num = ssl3_handshake_msg_hdr_len(s) + (int)len; 1721 s->internal->init_num = ssl3_handshake_msg_hdr_len(s) + (int)len;
1722 s->init_off = 0; 1722 s->internal->init_off = 0;
1723 1723
1724 if (SSL_IS_DTLS(s)) { 1724 if (SSL_IS_DTLS(s)) {
1725 dtls1_set_message_header(s, d, msg_type, len, 0, len); 1725 dtls1_set_message_header(s, d, msg_type, len, 0, len);
@@ -1766,13 +1766,13 @@ ssl3_handshake_msg_finish_cbb(SSL *s, CBB *handshake)
1766 if (outlen > INT_MAX) 1766 if (outlen > INT_MAX)
1767 goto err; 1767 goto err;
1768 1768
1769 if (!BUF_MEM_grow_clean(s->init_buf, outlen)) 1769 if (!BUF_MEM_grow_clean(s->internal->init_buf, outlen))
1770 goto err; 1770 goto err;
1771 1771
1772 memcpy(s->init_buf->data, data, outlen); 1772 memcpy(s->internal->init_buf->data, data, outlen);
1773 1773
1774 s->init_num = (int)outlen; 1774 s->internal->init_num = (int)outlen;
1775 s->init_off = 0; 1775 s->internal->init_off = 0;
1776 1776
1777 if (SSL_IS_DTLS(s)) { 1777 if (SSL_IS_DTLS(s)) {
1778 unsigned long len; 1778 unsigned long len;
@@ -1905,7 +1905,7 @@ ssl3_clear(SSL *s)
1905 S3I(s)->num_renegotiations = 0; 1905 S3I(s)->num_renegotiations = 0;
1906 S3I(s)->in_read_app_data = 0; 1906 S3I(s)->in_read_app_data = 0;
1907 1907
1908 s->packet_length = 0; 1908 s->internal->packet_length = 0;
1909 s->version = TLS1_VERSION; 1909 s->version = TLS1_VERSION;
1910 1910
1911 free(s->internal->next_proto_negotiated); 1911 free(s->internal->next_proto_negotiated);
@@ -1990,7 +1990,7 @@ ssl3_ctrl(SSL *s, int cmd, long larg, void *parg)
1990 1990
1991 switch (cmd) { 1991 switch (cmd) {
1992 case SSL_CTRL_GET_SESSION_REUSED: 1992 case SSL_CTRL_GET_SESSION_REUSED:
1993 ret = s->hit; 1993 ret = s->internal->hit;
1994 break; 1994 break;
1995 case SSL_CTRL_GET_CLIENT_CERT_REQUEST: 1995 case SSL_CTRL_GET_CLIENT_CERT_REQUEST:
1996 break; 1996 break;
@@ -2112,33 +2112,33 @@ ssl3_ctrl(SSL *s, int cmd, long larg, void *parg)
2112 break; 2112 break;
2113 2113
2114 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS: 2114 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS:
2115 *(STACK_OF(X509_EXTENSION) **)parg = s->tlsext_ocsp_exts; 2115 *(STACK_OF(X509_EXTENSION) **)parg = s->internal->tlsext_ocsp_exts;
2116 ret = 1; 2116 ret = 1;
2117 break; 2117 break;
2118 2118
2119 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS: 2119 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS:
2120 s->tlsext_ocsp_exts = parg; 2120 s->internal->tlsext_ocsp_exts = parg;
2121 ret = 1; 2121 ret = 1;
2122 break; 2122 break;
2123 2123
2124 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_IDS: 2124 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_IDS:
2125 *(STACK_OF(OCSP_RESPID) **)parg = s->tlsext_ocsp_ids; 2125 *(STACK_OF(OCSP_RESPID) **)parg = s->internal->tlsext_ocsp_ids;
2126 ret = 1; 2126 ret = 1;
2127 break; 2127 break;
2128 2128
2129 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_IDS: 2129 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_IDS:
2130 s->tlsext_ocsp_ids = parg; 2130 s->internal->tlsext_ocsp_ids = parg;
2131 ret = 1; 2131 ret = 1;
2132 break; 2132 break;
2133 2133
2134 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP: 2134 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP:
2135 *(unsigned char **)parg = s->tlsext_ocsp_resp; 2135 *(unsigned char **)parg = s->internal->tlsext_ocsp_resp;
2136 return s->tlsext_ocsp_resplen; 2136 return s->internal->tlsext_ocsp_resplen;
2137 2137
2138 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP: 2138 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP:
2139 free(s->tlsext_ocsp_resp); 2139 free(s->internal->tlsext_ocsp_resp);
2140 s->tlsext_ocsp_resp = parg; 2140 s->internal->tlsext_ocsp_resp = parg;
2141 s->tlsext_ocsp_resplen = larg; 2141 s->internal->tlsext_ocsp_resplen = larg;
2142 ret = 1; 2142 ret = 1;
2143 break; 2143 break;
2144 2144
@@ -2505,13 +2505,13 @@ ssl3_shutdown(SSL *s)
2505 * Don't do anything much if we have not done the handshake or 2505 * Don't do anything much if we have not done the handshake or
2506 * we don't want to send messages :-) 2506 * we don't want to send messages :-)
2507 */ 2507 */
2508 if ((s->quiet_shutdown) || (s->state == SSL_ST_BEFORE)) { 2508 if ((s->internal->quiet_shutdown) || (s->state == SSL_ST_BEFORE)) {
2509 s->shutdown = (SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN); 2509 s->internal->shutdown = (SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN);
2510 return (1); 2510 return (1);
2511 } 2511 }
2512 2512
2513 if (!(s->shutdown & SSL_SENT_SHUTDOWN)) { 2513 if (!(s->internal->shutdown & SSL_SENT_SHUTDOWN)) {
2514 s->shutdown|=SSL_SENT_SHUTDOWN; 2514 s->internal->shutdown|=SSL_SENT_SHUTDOWN;
2515 ssl3_send_alert(s, SSL3_AL_WARNING, SSL_AD_CLOSE_NOTIFY); 2515 ssl3_send_alert(s, SSL3_AL_WARNING, SSL_AD_CLOSE_NOTIFY);
2516 /* 2516 /*
2517 * Our shutdown alert has been sent now, and if it still needs 2517 * Our shutdown alert has been sent now, and if it still needs
@@ -2531,15 +2531,15 @@ ssl3_shutdown(SSL *s)
2531 */ 2531 */
2532 return (ret); 2532 return (ret);
2533 } 2533 }
2534 } else if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) { 2534 } else if (!(s->internal->shutdown & SSL_RECEIVED_SHUTDOWN)) {
2535 /* If we are waiting for a close from our peer, we are closed */ 2535 /* If we are waiting for a close from our peer, we are closed */
2536 s->method->ssl_read_bytes(s, 0, NULL, 0, 0); 2536 s->method->ssl_read_bytes(s, 0, NULL, 0, 0);
2537 if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) { 2537 if (!(s->internal->shutdown & SSL_RECEIVED_SHUTDOWN)) {
2538 return(-1); /* return WANT_READ */ 2538 return(-1); /* return WANT_READ */
2539 } 2539 }
2540 } 2540 }
2541 2541
2542 if ((s->shutdown == (SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN)) && 2542 if ((s->internal->shutdown == (SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN)) &&
2543 !s->s3->alert_dispatch) 2543 !s->s3->alert_dispatch)
2544 return (1); 2544 return (1);
2545 else 2545 else
@@ -2552,8 +2552,8 @@ ssl3_write(SSL *s, const void *buf, int len)
2552 int ret, n; 2552 int ret, n;
2553 2553
2554#if 0 2554#if 0
2555 if (s->shutdown & SSL_SEND_SHUTDOWN) { 2555 if (s->internal->shutdown & SSL_SEND_SHUTDOWN) {
2556 s->rwstate = SSL_NOTHING; 2556 s->internal->rwstate = SSL_NOTHING;
2557 return (0); 2557 return (0);
2558 } 2558 }
2559#endif 2559#endif
@@ -2579,11 +2579,11 @@ ssl3_write(SSL *s, const void *buf, int len)
2579 S3I(s)->delay_buf_pop_ret = ret; 2579 S3I(s)->delay_buf_pop_ret = ret;
2580 } 2580 }
2581 2581
2582 s->rwstate = SSL_WRITING; 2582 s->internal->rwstate = SSL_WRITING;
2583 n = BIO_flush(s->wbio); 2583 n = BIO_flush(s->wbio);
2584 if (n <= 0) 2584 if (n <= 0)
2585 return (n); 2585 return (n);
2586 s->rwstate = SSL_NOTHING; 2586 s->internal->rwstate = SSL_NOTHING;
2587 2587
2588 /* We have flushed the buffer, so remove it */ 2588 /* We have flushed the buffer, so remove it */
2589 ssl_free_wbio_buffer(s); 2589 ssl_free_wbio_buffer(s);