diff options
author | jsing <> | 2014-04-15 12:00:25 +0000 |
---|---|---|
committer | jsing <> | 2014-04-15 12:00:25 +0000 |
commit | 119df02356e2634a1f38a23d288d8774e841e5f7 (patch) | |
tree | 3ba45c8dc0a2bcf26ddd859d8ee8c4dfb1b8e4b2 /src/lib/libssl/ssl3.h | |
parent | ab563839bbe3ddf11336b51c80c7fb09adb04abb (diff) | |
download | openbsd-119df02356e2634a1f38a23d288d8774e841e5f7.tar.gz openbsd-119df02356e2634a1f38a23d288d8774e841e5f7.tar.bz2 openbsd-119df02356e2634a1f38a23d288d8774e841e5f7.zip |
First pass at applying KNF to the OpenSSL code, which almost makes it
readable. This pass is whitespace only and can readily be verified using
tr and md5.
There is still a huge amount of inconsistency within these headers.
Diffstat (limited to 'src/lib/libssl/ssl3.h')
-rw-r--r-- | src/lib/libssl/ssl3.h | 70 |
1 files changed, 34 insertions, 36 deletions
diff --git a/src/lib/libssl/ssl3.h b/src/lib/libssl/ssl3.h index cb8b2492ec..2b25357917 100644 --- a/src/lib/libssl/ssl3.h +++ b/src/lib/libssl/ssl3.h | |||
@@ -163,13 +163,13 @@ extern "C" { | |||
163 | #define SSL3_CK_ADH_DES_192_CBC_SHA 0x0300001B | 163 | #define SSL3_CK_ADH_DES_192_CBC_SHA 0x0300001B |
164 | 164 | ||
165 | #if 0 | 165 | #if 0 |
166 | #define SSL3_CK_FZA_DMS_NULL_SHA 0x0300001C | 166 | #define SSL3_CK_FZA_DMS_NULL_SHA 0x0300001C |
167 | #define SSL3_CK_FZA_DMS_FZA_SHA 0x0300001D | 167 | #define SSL3_CK_FZA_DMS_FZA_SHA 0x0300001D |
168 | #if 0 /* Because it clashes with KRB5, is never used any more, and is safe | 168 | #if 0 /* Because it clashes with KRB5, is never used any more, and is safe |
169 | to remove according to David Hopwood <david.hopwood@zetnet.co.uk> | 169 | to remove according to David Hopwood <david.hopwood@zetnet.co.uk> |
170 | of the ietf-tls list */ | 170 | of the ietf-tls list */ |
171 | #define SSL3_CK_FZA_DMS_RC4_SHA 0x0300001E | 171 | #define SSL3_CK_FZA_DMS_RC4_SHA 0x0300001E |
172 | #endif | 172 | #endif |
173 | #endif | 173 | #endif |
174 | 174 | ||
175 | /* VRS Additional Kerberos5 entries | 175 | /* VRS Additional Kerberos5 entries |
@@ -222,9 +222,9 @@ extern "C" { | |||
222 | #define SSL3_TXT_ADH_DES_192_CBC_SHA "ADH-DES-CBC3-SHA" | 222 | #define SSL3_TXT_ADH_DES_192_CBC_SHA "ADH-DES-CBC3-SHA" |
223 | 223 | ||
224 | #if 0 | 224 | #if 0 |
225 | #define SSL3_TXT_FZA_DMS_NULL_SHA "FZA-NULL-SHA" | 225 | #define SSL3_TXT_FZA_DMS_NULL_SHA "FZA-NULL-SHA" |
226 | #define SSL3_TXT_FZA_DMS_FZA_SHA "FZA-FZA-CBC-SHA" | 226 | #define SSL3_TXT_FZA_DMS_FZA_SHA "FZA-FZA-CBC-SHA" |
227 | #define SSL3_TXT_FZA_DMS_RC4_SHA "FZA-RC4-SHA" | 227 | #define SSL3_TXT_FZA_DMS_RC4_SHA "FZA-RC4-SHA" |
228 | #endif | 228 | #endif |
229 | 229 | ||
230 | #define SSL3_TXT_KRB5_DES_64_CBC_SHA "KRB5-DES-CBC-SHA" | 230 | #define SSL3_TXT_KRB5_DES_64_CBC_SHA "KRB5-DES-CBC-SHA" |
@@ -342,11 +342,10 @@ extern "C" { | |||
342 | 342 | ||
343 | #define TLS1_HB_REQUEST 1 | 343 | #define TLS1_HB_REQUEST 1 |
344 | #define TLS1_HB_RESPONSE 2 | 344 | #define TLS1_HB_RESPONSE 2 |
345 | 345 | ||
346 | #ifndef OPENSSL_NO_SSL_INTERN | 346 | #ifndef OPENSSL_NO_SSL_INTERN |
347 | 347 | ||
348 | typedef struct ssl3_record_st | 348 | typedef struct ssl3_record_st { |
349 | { | ||
350 | /*r */ int type; /* type of record */ | 349 | /*r */ int type; /* type of record */ |
351 | /*rw*/ unsigned int length; /* How many bytes available */ | 350 | /*rw*/ unsigned int length; /* How many bytes available */ |
352 | /*r */ unsigned int off; /* read/write offset into 'buf' */ | 351 | /*r */ unsigned int off; /* read/write offset into 'buf' */ |
@@ -355,16 +354,15 @@ typedef struct ssl3_record_st | |||
355 | /*r */ unsigned char *comp; /* only used with decompression - malloc()ed */ | 354 | /*r */ unsigned char *comp; /* only used with decompression - malloc()ed */ |
356 | /*r */ unsigned long epoch; /* epoch number, needed by DTLS1 */ | 355 | /*r */ unsigned long epoch; /* epoch number, needed by DTLS1 */ |
357 | /*r */ unsigned char seq_num[8]; /* sequence number, needed by DTLS1 */ | 356 | /*r */ unsigned char seq_num[8]; /* sequence number, needed by DTLS1 */ |
358 | } SSL3_RECORD; | 357 | } SSL3_RECORD; |
359 | 358 | ||
360 | typedef struct ssl3_buffer_st | 359 | typedef struct ssl3_buffer_st { |
361 | { | 360 | unsigned char *buf; /* at least SSL3_RT_MAX_PACKET_SIZE bytes, |
362 | unsigned char *buf; /* at least SSL3_RT_MAX_PACKET_SIZE bytes, | ||
363 | * see ssl3_setup_buffers() */ | 361 | * see ssl3_setup_buffers() */ |
364 | size_t len; /* buffer size */ | 362 | size_t len; /* buffer size */ |
365 | int offset; /* where to 'copy from' */ | 363 | int offset; /* where to 'copy from' */ |
366 | int left; /* how many bytes left */ | 364 | int left; /* how many bytes left */ |
367 | } SSL3_BUFFER; | 365 | } SSL3_BUFFER; |
368 | 366 | ||
369 | #endif | 367 | #endif |
370 | 368 | ||
@@ -388,7 +386,7 @@ typedef struct ssl3_buffer_st | |||
388 | #define TLS1_FLAGS_TLS_PADDING_BUG 0x0008 | 386 | #define TLS1_FLAGS_TLS_PADDING_BUG 0x0008 |
389 | #define TLS1_FLAGS_SKIP_CERT_VERIFY 0x0010 | 387 | #define TLS1_FLAGS_SKIP_CERT_VERIFY 0x0010 |
390 | #define TLS1_FLAGS_KEEP_HANDSHAKE 0x0020 | 388 | #define TLS1_FLAGS_KEEP_HANDSHAKE 0x0020 |
391 | 389 | ||
392 | /* SSL3_FLAGS_SGC_RESTART_DONE is set when we | 390 | /* SSL3_FLAGS_SGC_RESTART_DONE is set when we |
393 | * restart a handshake because of MS SGC and so prevents us | 391 | * restart a handshake because of MS SGC and so prevents us |
394 | * from restarting the handshake in a loop. It's reset on a | 392 | * from restarting the handshake in a loop. It's reset on a |
@@ -402,8 +400,7 @@ typedef struct ssl3_buffer_st | |||
402 | 400 | ||
403 | #ifndef OPENSSL_NO_SSL_INTERN | 401 | #ifndef OPENSSL_NO_SSL_INTERN |
404 | 402 | ||
405 | typedef struct ssl3_state_st | 403 | typedef struct ssl3_state_st { |
406 | { | ||
407 | long flags; | 404 | long flags; |
408 | int delay_buf_pop_ret; | 405 | int delay_buf_pop_ret; |
409 | 406 | ||
@@ -471,7 +468,8 @@ typedef struct ssl3_state_st | |||
471 | 468 | ||
472 | /* Opaque PRF input as used for the current handshake. | 469 | /* Opaque PRF input as used for the current handshake. |
473 | * These fields are used only if TLSEXT_TYPE_opaque_prf_input is defined | 470 | * These fields are used only if TLSEXT_TYPE_opaque_prf_input is defined |
474 | * (otherwise, they are merely present to improve binary compatibility) */ | 471 | * (otherwise, they are merely present to improve binary compatibility) |
472 | */ | ||
475 | void *client_opaque_prf_input; | 473 | void *client_opaque_prf_input; |
476 | size_t client_opaque_prf_input_len; | 474 | size_t client_opaque_prf_input_len; |
477 | void *server_opaque_prf_input; | 475 | void *server_opaque_prf_input; |
@@ -501,7 +499,7 @@ typedef struct ssl3_state_st | |||
501 | #endif | 499 | #endif |
502 | 500 | ||
503 | /* used when SSL_ST_FLUSH_DATA is entered */ | 501 | /* used when SSL_ST_FLUSH_DATA is entered */ |
504 | int next_state; | 502 | int next_state; |
505 | 503 | ||
506 | int reuse_message; | 504 | int reuse_message; |
507 | 505 | ||
@@ -526,17 +524,18 @@ typedef struct ssl3_state_st | |||
526 | char *new_compression; | 524 | char *new_compression; |
527 | #endif | 525 | #endif |
528 | int cert_request; | 526 | int cert_request; |
529 | } tmp; | 527 | } tmp; |
530 | 528 | ||
531 | /* Connection binding to prevent renegotiation attacks */ | 529 | /* Connection binding to prevent renegotiation attacks */ |
532 | unsigned char previous_client_finished[EVP_MAX_MD_SIZE]; | 530 | unsigned char previous_client_finished[EVP_MAX_MD_SIZE]; |
533 | unsigned char previous_client_finished_len; | 531 | unsigned char previous_client_finished_len; |
534 | unsigned char previous_server_finished[EVP_MAX_MD_SIZE]; | 532 | unsigned char previous_server_finished[EVP_MAX_MD_SIZE]; |
535 | unsigned char previous_server_finished_len; | 533 | unsigned char previous_server_finished_len; |
536 | int send_connection_binding; /* TODOEKR */ | 534 | int send_connection_binding; /* TODOEKR */ |
537 | 535 | ||
538 | #ifndef OPENSSL_NO_NEXTPROTONEG | 536 | #ifndef OPENSSL_NO_NEXTPROTONEG |
539 | /* Set if we saw the Next Protocol Negotiation extension from our peer. */ | 537 | /* Set if we saw the Next Protocol Negotiation extension from our peer. |
538 | */ | ||
540 | int next_proto_neg_seen; | 539 | int next_proto_neg_seen; |
541 | #endif | 540 | #endif |
542 | 541 | ||
@@ -548,7 +547,7 @@ typedef struct ssl3_state_st | |||
548 | char is_probably_safari; | 547 | char is_probably_safari; |
549 | #endif /* !OPENSSL_NO_EC */ | 548 | #endif /* !OPENSSL_NO_EC */ |
550 | #endif /* !OPENSSL_NO_TLSEXT */ | 549 | #endif /* !OPENSSL_NO_TLSEXT */ |
551 | } SSL3_STATE; | 550 | } SSL3_STATE; |
552 | 551 | ||
553 | #endif | 552 | #endif |
554 | 553 | ||
@@ -690,4 +689,3 @@ typedef struct ssl3_state_st | |||
690 | } | 689 | } |
691 | #endif | 690 | #endif |
692 | #endif | 691 | #endif |
693 | |||