summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl3.h
diff options
context:
space:
mode:
authorjsing <>2014-04-15 12:00:25 +0000
committerjsing <>2014-04-15 12:00:25 +0000
commit119df02356e2634a1f38a23d288d8774e841e5f7 (patch)
tree3ba45c8dc0a2bcf26ddd859d8ee8c4dfb1b8e4b2 /src/lib/libssl/ssl3.h
parentab563839bbe3ddf11336b51c80c7fb09adb04abb (diff)
downloadopenbsd-119df02356e2634a1f38a23d288d8774e841e5f7.tar.gz
openbsd-119df02356e2634a1f38a23d288d8774e841e5f7.tar.bz2
openbsd-119df02356e2634a1f38a23d288d8774e841e5f7.zip
First pass at applying KNF to the OpenSSL code, which almost makes it
readable. This pass is whitespace only and can readily be verified using tr and md5. There is still a huge amount of inconsistency within these headers.
Diffstat (limited to 'src/lib/libssl/ssl3.h')
-rw-r--r--src/lib/libssl/ssl3.h70
1 files changed, 34 insertions, 36 deletions
diff --git a/src/lib/libssl/ssl3.h b/src/lib/libssl/ssl3.h
index cb8b2492ec..2b25357917 100644
--- a/src/lib/libssl/ssl3.h
+++ b/src/lib/libssl/ssl3.h
@@ -163,13 +163,13 @@ extern "C" {
163#define SSL3_CK_ADH_DES_192_CBC_SHA 0x0300001B 163#define SSL3_CK_ADH_DES_192_CBC_SHA 0x0300001B
164 164
165#if 0 165#if 0
166 #define SSL3_CK_FZA_DMS_NULL_SHA 0x0300001C 166#define SSL3_CK_FZA_DMS_NULL_SHA 0x0300001C
167 #define SSL3_CK_FZA_DMS_FZA_SHA 0x0300001D 167#define SSL3_CK_FZA_DMS_FZA_SHA 0x0300001D
168 #if 0 /* Because it clashes with KRB5, is never used any more, and is safe 168#if 0 /* Because it clashes with KRB5, is never used any more, and is safe
169 to remove according to David Hopwood <david.hopwood@zetnet.co.uk> 169 to remove according to David Hopwood <david.hopwood@zetnet.co.uk>
170 of the ietf-tls list */ 170 of the ietf-tls list */
171 #define SSL3_CK_FZA_DMS_RC4_SHA 0x0300001E 171#define SSL3_CK_FZA_DMS_RC4_SHA 0x0300001E
172 #endif 172#endif
173#endif 173#endif
174 174
175/* VRS Additional Kerberos5 entries 175/* VRS Additional Kerberos5 entries
@@ -222,9 +222,9 @@ extern "C" {
222#define SSL3_TXT_ADH_DES_192_CBC_SHA "ADH-DES-CBC3-SHA" 222#define SSL3_TXT_ADH_DES_192_CBC_SHA "ADH-DES-CBC3-SHA"
223 223
224#if 0 224#if 0
225 #define SSL3_TXT_FZA_DMS_NULL_SHA "FZA-NULL-SHA" 225#define SSL3_TXT_FZA_DMS_NULL_SHA "FZA-NULL-SHA"
226 #define SSL3_TXT_FZA_DMS_FZA_SHA "FZA-FZA-CBC-SHA" 226#define SSL3_TXT_FZA_DMS_FZA_SHA "FZA-FZA-CBC-SHA"
227 #define SSL3_TXT_FZA_DMS_RC4_SHA "FZA-RC4-SHA" 227#define SSL3_TXT_FZA_DMS_RC4_SHA "FZA-RC4-SHA"
228#endif 228#endif
229 229
230#define SSL3_TXT_KRB5_DES_64_CBC_SHA "KRB5-DES-CBC-SHA" 230#define SSL3_TXT_KRB5_DES_64_CBC_SHA "KRB5-DES-CBC-SHA"
@@ -342,11 +342,10 @@ extern "C" {
342 342
343#define TLS1_HB_REQUEST 1 343#define TLS1_HB_REQUEST 1
344#define TLS1_HB_RESPONSE 2 344#define TLS1_HB_RESPONSE 2
345 345
346#ifndef OPENSSL_NO_SSL_INTERN 346#ifndef OPENSSL_NO_SSL_INTERN
347 347
348typedef struct ssl3_record_st 348typedef struct ssl3_record_st {
349 {
350/*r */ int type; /* type of record */ 349/*r */ int type; /* type of record */
351/*rw*/ unsigned int length; /* How many bytes available */ 350/*rw*/ unsigned int length; /* How many bytes available */
352/*r */ unsigned int off; /* read/write offset into 'buf' */ 351/*r */ unsigned int off; /* read/write offset into 'buf' */
@@ -355,16 +354,15 @@ typedef struct ssl3_record_st
355/*r */ unsigned char *comp; /* only used with decompression - malloc()ed */ 354/*r */ unsigned char *comp; /* only used with decompression - malloc()ed */
356/*r */ unsigned long epoch; /* epoch number, needed by DTLS1 */ 355/*r */ unsigned long epoch; /* epoch number, needed by DTLS1 */
357/*r */ unsigned char seq_num[8]; /* sequence number, needed by DTLS1 */ 356/*r */ unsigned char seq_num[8]; /* sequence number, needed by DTLS1 */
358 } SSL3_RECORD; 357} SSL3_RECORD;
359 358
360typedef struct ssl3_buffer_st 359typedef struct ssl3_buffer_st {
361 { 360 unsigned char *buf; /* at least SSL3_RT_MAX_PACKET_SIZE bytes,
362 unsigned char *buf; /* at least SSL3_RT_MAX_PACKET_SIZE bytes,
363 * see ssl3_setup_buffers() */ 361 * see ssl3_setup_buffers() */
364 size_t len; /* buffer size */ 362 size_t len; /* buffer size */
365 int offset; /* where to 'copy from' */ 363 int offset; /* where to 'copy from' */
366 int left; /* how many bytes left */ 364 int left; /* how many bytes left */
367 } SSL3_BUFFER; 365} SSL3_BUFFER;
368 366
369#endif 367#endif
370 368
@@ -388,7 +386,7 @@ typedef struct ssl3_buffer_st
388#define TLS1_FLAGS_TLS_PADDING_BUG 0x0008 386#define TLS1_FLAGS_TLS_PADDING_BUG 0x0008
389#define TLS1_FLAGS_SKIP_CERT_VERIFY 0x0010 387#define TLS1_FLAGS_SKIP_CERT_VERIFY 0x0010
390#define TLS1_FLAGS_KEEP_HANDSHAKE 0x0020 388#define TLS1_FLAGS_KEEP_HANDSHAKE 0x0020
391 389
392/* SSL3_FLAGS_SGC_RESTART_DONE is set when we 390/* SSL3_FLAGS_SGC_RESTART_DONE is set when we
393 * restart a handshake because of MS SGC and so prevents us 391 * restart a handshake because of MS SGC and so prevents us
394 * from restarting the handshake in a loop. It's reset on a 392 * from restarting the handshake in a loop. It's reset on a
@@ -402,8 +400,7 @@ typedef struct ssl3_buffer_st
402 400
403#ifndef OPENSSL_NO_SSL_INTERN 401#ifndef OPENSSL_NO_SSL_INTERN
404 402
405typedef struct ssl3_state_st 403typedef struct ssl3_state_st {
406 {
407 long flags; 404 long flags;
408 int delay_buf_pop_ret; 405 int delay_buf_pop_ret;
409 406
@@ -471,7 +468,8 @@ typedef struct ssl3_state_st
471 468
472 /* Opaque PRF input as used for the current handshake. 469 /* Opaque PRF input as used for the current handshake.
473 * These fields are used only if TLSEXT_TYPE_opaque_prf_input is defined 470 * These fields are used only if TLSEXT_TYPE_opaque_prf_input is defined
474 * (otherwise, they are merely present to improve binary compatibility) */ 471 * (otherwise, they are merely present to improve binary compatibility)
472 */
475 void *client_opaque_prf_input; 473 void *client_opaque_prf_input;
476 size_t client_opaque_prf_input_len; 474 size_t client_opaque_prf_input_len;
477 void *server_opaque_prf_input; 475 void *server_opaque_prf_input;
@@ -501,7 +499,7 @@ typedef struct ssl3_state_st
501#endif 499#endif
502 500
503 /* used when SSL_ST_FLUSH_DATA is entered */ 501 /* used when SSL_ST_FLUSH_DATA is entered */
504 int next_state; 502 int next_state;
505 503
506 int reuse_message; 504 int reuse_message;
507 505
@@ -526,17 +524,18 @@ typedef struct ssl3_state_st
526 char *new_compression; 524 char *new_compression;
527#endif 525#endif
528 int cert_request; 526 int cert_request;
529 } tmp; 527 } tmp;
530 528
531 /* Connection binding to prevent renegotiation attacks */ 529 /* Connection binding to prevent renegotiation attacks */
532 unsigned char previous_client_finished[EVP_MAX_MD_SIZE]; 530 unsigned char previous_client_finished[EVP_MAX_MD_SIZE];
533 unsigned char previous_client_finished_len; 531 unsigned char previous_client_finished_len;
534 unsigned char previous_server_finished[EVP_MAX_MD_SIZE]; 532 unsigned char previous_server_finished[EVP_MAX_MD_SIZE];
535 unsigned char previous_server_finished_len; 533 unsigned char previous_server_finished_len;
536 int send_connection_binding; /* TODOEKR */ 534 int send_connection_binding; /* TODOEKR */
537 535
538#ifndef OPENSSL_NO_NEXTPROTONEG 536#ifndef OPENSSL_NO_NEXTPROTONEG
539 /* Set if we saw the Next Protocol Negotiation extension from our peer. */ 537 /* Set if we saw the Next Protocol Negotiation extension from our peer.
538 */
540 int next_proto_neg_seen; 539 int next_proto_neg_seen;
541#endif 540#endif
542 541
@@ -548,7 +547,7 @@ typedef struct ssl3_state_st
548 char is_probably_safari; 547 char is_probably_safari;
549#endif /* !OPENSSL_NO_EC */ 548#endif /* !OPENSSL_NO_EC */
550#endif /* !OPENSSL_NO_TLSEXT */ 549#endif /* !OPENSSL_NO_TLSEXT */
551 } SSL3_STATE; 550} SSL3_STATE;
552 551
553#endif 552#endif
554 553
@@ -690,4 +689,3 @@ typedef struct ssl3_state_st
690} 689}
691#endif 690#endif
692#endif 691#endif
693