diff options
author | jsing <> | 2022-02-05 14:54:10 +0000 |
---|---|---|
committer | jsing <> | 2022-02-05 14:54:10 +0000 |
commit | 83e485da0e6d59ae7baf4be882b7d2a569774e84 (patch) | |
tree | da7fe094101bf3711667cf1650e3c6f57a50e2ff /src/lib/libssl/ssl_ciphers.c | |
parent | a97d9e9ca8287d1d19559ab919f71b5c5771caeb (diff) | |
download | openbsd-83e485da0e6d59ae7baf4be882b7d2a569774e84.tar.gz openbsd-83e485da0e6d59ae7baf4be882b7d2a569774e84.tar.bz2 openbsd-83e485da0e6d59ae7baf4be882b7d2a569774e84.zip |
Bye bye S3I.
S3I has served us well, however now that libssl is fully opaque it is time
to say goodbye. Aside from removing the calloc/free/memset, the rest is
mechanical sed.
ok inoguchi@ tb@
Diffstat (limited to 'src/lib/libssl/ssl_ciphers.c')
-rw-r--r-- | src/lib/libssl/ssl_ciphers.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/src/lib/libssl/ssl_ciphers.c b/src/lib/libssl/ssl_ciphers.c index 4e4a0d93a4..7ac40126ed 100644 --- a/src/lib/libssl/ssl_ciphers.c +++ b/src/lib/libssl/ssl_ciphers.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_ciphers.c,v 1.11 2021/03/11 17:14:46 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_ciphers.c,v 1.12 2022/02/05 14:54:10 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2015-2017 Doug Hogan <doug@openbsd.org> | 3 | * Copyright (c) 2015-2017 Doug Hogan <doug@openbsd.org> |
4 | * Copyright (c) 2015-2018, 2020 Joel Sing <jsing@openbsd.org> | 4 | * Copyright (c) 2015-2018, 2020 Joel Sing <jsing@openbsd.org> |
@@ -96,7 +96,7 @@ ssl_bytes_to_cipher_list(SSL *s, CBS *cbs) | |||
96 | uint16_t cipher_value; | 96 | uint16_t cipher_value; |
97 | unsigned long cipher_id; | 97 | unsigned long cipher_id; |
98 | 98 | ||
99 | S3I(s)->send_connection_binding = 0; | 99 | s->s3->send_connection_binding = 0; |
100 | 100 | ||
101 | if ((ciphers = sk_SSL_CIPHER_new_null()) == NULL) { | 101 | if ((ciphers = sk_SSL_CIPHER_new_null()) == NULL) { |
102 | SSLerror(s, ERR_R_MALLOC_FAILURE); | 102 | SSLerror(s, ERR_R_MALLOC_FAILURE); |
@@ -123,7 +123,7 @@ ssl_bytes_to_cipher_list(SSL *s, CBS *cbs) | |||
123 | 123 | ||
124 | goto err; | 124 | goto err; |
125 | } | 125 | } |
126 | S3I(s)->send_connection_binding = 1; | 126 | s->s3->send_connection_binding = 1; |
127 | continue; | 127 | continue; |
128 | } | 128 | } |
129 | 129 | ||
@@ -134,8 +134,8 @@ ssl_bytes_to_cipher_list(SSL *s, CBS *cbs) | |||
134 | * Fail if the current version is an unexpected | 134 | * Fail if the current version is an unexpected |
135 | * downgrade. | 135 | * downgrade. |
136 | */ | 136 | */ |
137 | if (S3I(s)->hs.negotiated_tls_version < | 137 | if (s->s3->hs.negotiated_tls_version < |
138 | S3I(s)->hs.our_max_tls_version) { | 138 | s->s3->hs.our_max_tls_version) { |
139 | SSLerror(s, SSL_R_INAPPROPRIATE_FALLBACK); | 139 | SSLerror(s, SSL_R_INAPPROPRIATE_FALLBACK); |
140 | ssl3_send_alert(s, SSL3_AL_FATAL, | 140 | ssl3_send_alert(s, SSL3_AL_FATAL, |
141 | SSL_AD_INAPPROPRIATE_FALLBACK); | 141 | SSL_AD_INAPPROPRIATE_FALLBACK); |