diff options
author | jsing <> | 2022-10-02 16:36:42 +0000 |
---|---|---|
committer | jsing <> | 2022-10-02 16:36:42 +0000 |
commit | 7a087580717329de5ef02600e4e1489d86249a88 (patch) | |
tree | 739f174130582d68ff159ff94cdb3fb2185e31ef /src/lib/libssl/ssl_cert.c | |
parent | d5e660940f76ba9fedb2400c0fa888e996ee93c9 (diff) | |
download | openbsd-7a087580717329de5ef02600e4e1489d86249a88.tar.gz openbsd-7a087580717329de5ef02600e4e1489d86249a88.tar.bz2 openbsd-7a087580717329de5ef02600e4e1489d86249a88.zip |
Get rid of SSL_CTX_INTERNAL and SSL_INTERNAL.
These are no longer necessary due to SSL_CTX and SSL now being fully
opaque. Merge SSL_CTX_INTERNAL back into SSL_CTX and SSL_INTERNAL back
into SSL.
Prompted by tb@
Diffstat (limited to 'src/lib/libssl/ssl_cert.c')
-rw-r--r-- | src/lib/libssl/ssl_cert.c | 38 |
1 files changed, 19 insertions, 19 deletions
diff --git a/src/lib/libssl/ssl_cert.c b/src/lib/libssl/ssl_cert.c index 453d75771d..d102e2e29d 100644 --- a/src/lib/libssl/ssl_cert.c +++ b/src/lib/libssl/ssl_cert.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_cert.c,v 1.103 2022/07/07 13:04:39 tb Exp $ */ | 1 | /* $OpenBSD: ssl_cert.c,v 1.104 2022/10/02 16:36:41 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -304,7 +304,7 @@ ssl_get0_cert(SSL_CTX *ctx, SSL *ssl) | |||
304 | if (ssl != NULL) | 304 | if (ssl != NULL) |
305 | return ssl->cert; | 305 | return ssl->cert; |
306 | 306 | ||
307 | return ctx->internal->cert; | 307 | return ctx->cert; |
308 | } | 308 | } |
309 | 309 | ||
310 | int | 310 | int |
@@ -430,21 +430,21 @@ ssl_verify_cert_chain(SSL *s, STACK_OF(X509) *certs) | |||
430 | */ | 430 | */ |
431 | X509_VERIFY_PARAM_set1(param, s->param); | 431 | X509_VERIFY_PARAM_set1(param, s->param); |
432 | 432 | ||
433 | if (s->internal->verify_callback) | 433 | if (s->verify_callback) |
434 | X509_STORE_CTX_set_verify_cb(ctx, s->internal->verify_callback); | 434 | X509_STORE_CTX_set_verify_cb(ctx, s->verify_callback); |
435 | 435 | ||
436 | if (s->ctx->internal->app_verify_callback != NULL) | 436 | if (s->ctx->app_verify_callback != NULL) |
437 | ret = s->ctx->internal->app_verify_callback(ctx, | 437 | ret = s->ctx->app_verify_callback(ctx, |
438 | s->ctx->internal->app_verify_arg); | 438 | s->ctx->app_verify_arg); |
439 | else | 439 | else |
440 | ret = X509_verify_cert(ctx); | 440 | ret = X509_verify_cert(ctx); |
441 | 441 | ||
442 | s->verify_result = X509_STORE_CTX_get_error(ctx); | 442 | s->verify_result = X509_STORE_CTX_get_error(ctx); |
443 | sk_X509_pop_free(s->internal->verified_chain, X509_free); | 443 | sk_X509_pop_free(s->verified_chain, X509_free); |
444 | s->internal->verified_chain = NULL; | 444 | s->verified_chain = NULL; |
445 | if (X509_STORE_CTX_get0_chain(ctx) != NULL) { | 445 | if (X509_STORE_CTX_get0_chain(ctx) != NULL) { |
446 | s->internal->verified_chain = X509_STORE_CTX_get1_chain(ctx); | 446 | s->verified_chain = X509_STORE_CTX_get1_chain(ctx); |
447 | if (s->internal->verified_chain == NULL) { | 447 | if (s->verified_chain == NULL) { |
448 | SSLerrorx(ERR_R_MALLOC_FAILURE); | 448 | SSLerrorx(ERR_R_MALLOC_FAILURE); |
449 | ret = 0; | 449 | ret = 0; |
450 | } | 450 | } |
@@ -491,19 +491,19 @@ SSL_dup_CA_list(const STACK_OF(X509_NAME) *sk) | |||
491 | void | 491 | void |
492 | SSL_set_client_CA_list(SSL *s, STACK_OF(X509_NAME) *name_list) | 492 | SSL_set_client_CA_list(SSL *s, STACK_OF(X509_NAME) *name_list) |
493 | { | 493 | { |
494 | set_client_CA_list(&(s->internal->client_CA), name_list); | 494 | set_client_CA_list(&(s->client_CA), name_list); |
495 | } | 495 | } |
496 | 496 | ||
497 | void | 497 | void |
498 | SSL_CTX_set_client_CA_list(SSL_CTX *ctx, STACK_OF(X509_NAME) *name_list) | 498 | SSL_CTX_set_client_CA_list(SSL_CTX *ctx, STACK_OF(X509_NAME) *name_list) |
499 | { | 499 | { |
500 | set_client_CA_list(&(ctx->internal->client_CA), name_list); | 500 | set_client_CA_list(&(ctx->client_CA), name_list); |
501 | } | 501 | } |
502 | 502 | ||
503 | STACK_OF(X509_NAME) * | 503 | STACK_OF(X509_NAME) * |
504 | SSL_CTX_get_client_CA_list(const SSL_CTX *ctx) | 504 | SSL_CTX_get_client_CA_list(const SSL_CTX *ctx) |
505 | { | 505 | { |
506 | return (ctx->internal->client_CA); | 506 | return (ctx->client_CA); |
507 | } | 507 | } |
508 | 508 | ||
509 | STACK_OF(X509_NAME) * | 509 | STACK_OF(X509_NAME) * |
@@ -516,10 +516,10 @@ SSL_get_client_CA_list(const SSL *s) | |||
516 | else | 516 | else |
517 | return (NULL); | 517 | return (NULL); |
518 | } else { | 518 | } else { |
519 | if (s->internal->client_CA != NULL) | 519 | if (s->client_CA != NULL) |
520 | return (s->internal->client_CA); | 520 | return (s->client_CA); |
521 | else | 521 | else |
522 | return (s->ctx->internal->client_CA); | 522 | return (s->ctx->client_CA); |
523 | } | 523 | } |
524 | } | 524 | } |
525 | 525 | ||
@@ -546,13 +546,13 @@ add_client_CA(STACK_OF(X509_NAME) **sk, X509 *x) | |||
546 | int | 546 | int |
547 | SSL_add_client_CA(SSL *ssl, X509 *x) | 547 | SSL_add_client_CA(SSL *ssl, X509 *x) |
548 | { | 548 | { |
549 | return (add_client_CA(&(ssl->internal->client_CA), x)); | 549 | return (add_client_CA(&(ssl->client_CA), x)); |
550 | } | 550 | } |
551 | 551 | ||
552 | int | 552 | int |
553 | SSL_CTX_add_client_CA(SSL_CTX *ctx, X509 *x) | 553 | SSL_CTX_add_client_CA(SSL_CTX *ctx, X509 *x) |
554 | { | 554 | { |
555 | return (add_client_CA(&(ctx->internal->client_CA), x)); | 555 | return (add_client_CA(&(ctx->client_CA), x)); |
556 | } | 556 | } |
557 | 557 | ||
558 | static int | 558 | static int |