diff options
| author | jsing <> | 2022-10-02 16:36:42 +0000 |
|---|---|---|
| committer | jsing <> | 2022-10-02 16:36:42 +0000 |
| commit | efde998d3821e41e124a4bfcdf103e506055fc52 (patch) | |
| tree | 739f174130582d68ff159ff94cdb3fb2185e31ef /src/lib/libssl/ssl_cert.c | |
| parent | ce780ee20f92c920e451f9c3bdd6bb5fe83f4c5b (diff) | |
| download | openbsd-efde998d3821e41e124a4bfcdf103e506055fc52.tar.gz openbsd-efde998d3821e41e124a4bfcdf103e506055fc52.tar.bz2 openbsd-efde998d3821e41e124a4bfcdf103e506055fc52.zip | |
Get rid of SSL_CTX_INTERNAL and SSL_INTERNAL.
These are no longer necessary due to SSL_CTX and SSL now being fully
opaque. Merge SSL_CTX_INTERNAL back into SSL_CTX and SSL_INTERNAL back
into SSL.
Prompted by tb@
Diffstat (limited to 'src/lib/libssl/ssl_cert.c')
| -rw-r--r-- | src/lib/libssl/ssl_cert.c | 38 |
1 files changed, 19 insertions, 19 deletions
diff --git a/src/lib/libssl/ssl_cert.c b/src/lib/libssl/ssl_cert.c index 453d75771d..d102e2e29d 100644 --- a/src/lib/libssl/ssl_cert.c +++ b/src/lib/libssl/ssl_cert.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_cert.c,v 1.103 2022/07/07 13:04:39 tb Exp $ */ | 1 | /* $OpenBSD: ssl_cert.c,v 1.104 2022/10/02 16:36:41 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -304,7 +304,7 @@ ssl_get0_cert(SSL_CTX *ctx, SSL *ssl) | |||
| 304 | if (ssl != NULL) | 304 | if (ssl != NULL) |
| 305 | return ssl->cert; | 305 | return ssl->cert; |
| 306 | 306 | ||
| 307 | return ctx->internal->cert; | 307 | return ctx->cert; |
| 308 | } | 308 | } |
| 309 | 309 | ||
| 310 | int | 310 | int |
| @@ -430,21 +430,21 @@ ssl_verify_cert_chain(SSL *s, STACK_OF(X509) *certs) | |||
| 430 | */ | 430 | */ |
| 431 | X509_VERIFY_PARAM_set1(param, s->param); | 431 | X509_VERIFY_PARAM_set1(param, s->param); |
| 432 | 432 | ||
| 433 | if (s->internal->verify_callback) | 433 | if (s->verify_callback) |
| 434 | X509_STORE_CTX_set_verify_cb(ctx, s->internal->verify_callback); | 434 | X509_STORE_CTX_set_verify_cb(ctx, s->verify_callback); |
| 435 | 435 | ||
| 436 | if (s->ctx->internal->app_verify_callback != NULL) | 436 | if (s->ctx->app_verify_callback != NULL) |
| 437 | ret = s->ctx->internal->app_verify_callback(ctx, | 437 | ret = s->ctx->app_verify_callback(ctx, |
| 438 | s->ctx->internal->app_verify_arg); | 438 | s->ctx->app_verify_arg); |
| 439 | else | 439 | else |
| 440 | ret = X509_verify_cert(ctx); | 440 | ret = X509_verify_cert(ctx); |
| 441 | 441 | ||
| 442 | s->verify_result = X509_STORE_CTX_get_error(ctx); | 442 | s->verify_result = X509_STORE_CTX_get_error(ctx); |
| 443 | sk_X509_pop_free(s->internal->verified_chain, X509_free); | 443 | sk_X509_pop_free(s->verified_chain, X509_free); |
| 444 | s->internal->verified_chain = NULL; | 444 | s->verified_chain = NULL; |
| 445 | if (X509_STORE_CTX_get0_chain(ctx) != NULL) { | 445 | if (X509_STORE_CTX_get0_chain(ctx) != NULL) { |
| 446 | s->internal->verified_chain = X509_STORE_CTX_get1_chain(ctx); | 446 | s->verified_chain = X509_STORE_CTX_get1_chain(ctx); |
| 447 | if (s->internal->verified_chain == NULL) { | 447 | if (s->verified_chain == NULL) { |
| 448 | SSLerrorx(ERR_R_MALLOC_FAILURE); | 448 | SSLerrorx(ERR_R_MALLOC_FAILURE); |
| 449 | ret = 0; | 449 | ret = 0; |
| 450 | } | 450 | } |
| @@ -491,19 +491,19 @@ SSL_dup_CA_list(const STACK_OF(X509_NAME) *sk) | |||
| 491 | void | 491 | void |
| 492 | SSL_set_client_CA_list(SSL *s, STACK_OF(X509_NAME) *name_list) | 492 | SSL_set_client_CA_list(SSL *s, STACK_OF(X509_NAME) *name_list) |
| 493 | { | 493 | { |
| 494 | set_client_CA_list(&(s->internal->client_CA), name_list); | 494 | set_client_CA_list(&(s->client_CA), name_list); |
| 495 | } | 495 | } |
| 496 | 496 | ||
| 497 | void | 497 | void |
| 498 | SSL_CTX_set_client_CA_list(SSL_CTX *ctx, STACK_OF(X509_NAME) *name_list) | 498 | SSL_CTX_set_client_CA_list(SSL_CTX *ctx, STACK_OF(X509_NAME) *name_list) |
| 499 | { | 499 | { |
| 500 | set_client_CA_list(&(ctx->internal->client_CA), name_list); | 500 | set_client_CA_list(&(ctx->client_CA), name_list); |
| 501 | } | 501 | } |
| 502 | 502 | ||
| 503 | STACK_OF(X509_NAME) * | 503 | STACK_OF(X509_NAME) * |
| 504 | SSL_CTX_get_client_CA_list(const SSL_CTX *ctx) | 504 | SSL_CTX_get_client_CA_list(const SSL_CTX *ctx) |
| 505 | { | 505 | { |
| 506 | return (ctx->internal->client_CA); | 506 | return (ctx->client_CA); |
| 507 | } | 507 | } |
| 508 | 508 | ||
| 509 | STACK_OF(X509_NAME) * | 509 | STACK_OF(X509_NAME) * |
| @@ -516,10 +516,10 @@ SSL_get_client_CA_list(const SSL *s) | |||
| 516 | else | 516 | else |
| 517 | return (NULL); | 517 | return (NULL); |
| 518 | } else { | 518 | } else { |
| 519 | if (s->internal->client_CA != NULL) | 519 | if (s->client_CA != NULL) |
| 520 | return (s->internal->client_CA); | 520 | return (s->client_CA); |
| 521 | else | 521 | else |
| 522 | return (s->ctx->internal->client_CA); | 522 | return (s->ctx->client_CA); |
| 523 | } | 523 | } |
| 524 | } | 524 | } |
| 525 | 525 | ||
| @@ -546,13 +546,13 @@ add_client_CA(STACK_OF(X509_NAME) **sk, X509 *x) | |||
| 546 | int | 546 | int |
| 547 | SSL_add_client_CA(SSL *ssl, X509 *x) | 547 | SSL_add_client_CA(SSL *ssl, X509 *x) |
| 548 | { | 548 | { |
| 549 | return (add_client_CA(&(ssl->internal->client_CA), x)); | 549 | return (add_client_CA(&(ssl->client_CA), x)); |
| 550 | } | 550 | } |
| 551 | 551 | ||
| 552 | int | 552 | int |
| 553 | SSL_CTX_add_client_CA(SSL_CTX *ctx, X509 *x) | 553 | SSL_CTX_add_client_CA(SSL_CTX *ctx, X509 *x) |
| 554 | { | 554 | { |
| 555 | return (add_client_CA(&(ctx->internal->client_CA), x)); | 555 | return (add_client_CA(&(ctx->client_CA), x)); |
| 556 | } | 556 | } |
| 557 | 557 | ||
| 558 | static int | 558 | static int |
