diff options
| author | jsing <> | 2021-10-23 13:36:03 +0000 |
|---|---|---|
| committer | jsing <> | 2021-10-23 13:36:03 +0000 |
| commit | 86a096b0c72b8b6be5c3299946b7ab98d3eee7e6 (patch) | |
| tree | 933fd8ce5aa09d290a07a30663a317d29bdd33c1 /src/lib/libssl/ssl_clnt.c | |
| parent | 78ef4e047e5997ed7c87fabef45dfd418d4fbeba (diff) | |
| download | openbsd-86a096b0c72b8b6be5c3299946b7ab98d3eee7e6.tar.gz openbsd-86a096b0c72b8b6be5c3299946b7ab98d3eee7e6.tar.bz2 openbsd-86a096b0c72b8b6be5c3299946b7ab98d3eee7e6.zip | |
Fold DTLS1_STATE_INTERNAL into DTLS1_STATE.
Now that DTLS1_STATE is opaque, fold DTLS1_STATE_INTERNAL back into
DTLS1_STATE and remove D1I() usage.
ok tb@
Diffstat (limited to 'src/lib/libssl/ssl_clnt.c')
| -rw-r--r-- | src/lib/libssl/ssl_clnt.c | 36 |
1 files changed, 18 insertions, 18 deletions
diff --git a/src/lib/libssl/ssl_clnt.c b/src/lib/libssl/ssl_clnt.c index 8a4c54e7b7..ea13f81596 100644 --- a/src/lib/libssl/ssl_clnt.c +++ b/src/lib/libssl/ssl_clnt.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_clnt.c,v 1.113 2021/10/23 08:34:36 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_clnt.c,v 1.114 2021/10/23 13:36:03 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -249,7 +249,7 @@ ssl3_connect(SSL *s) | |||
| 249 | /* mark client_random uninitialized */ | 249 | /* mark client_random uninitialized */ |
| 250 | memset(s->s3->client_random, 0, | 250 | memset(s->s3->client_random, 0, |
| 251 | sizeof(s->s3->client_random)); | 251 | sizeof(s->s3->client_random)); |
| 252 | D1I(s)->send_cookie = 0; | 252 | s->d1->send_cookie = 0; |
| 253 | s->internal->hit = 0; | 253 | s->internal->hit = 0; |
| 254 | } | 254 | } |
| 255 | break; | 255 | break; |
| @@ -269,7 +269,7 @@ ssl3_connect(SSL *s) | |||
| 269 | if (ret <= 0) | 269 | if (ret <= 0) |
| 270 | goto end; | 270 | goto end; |
| 271 | 271 | ||
| 272 | if (SSL_is_dtls(s) && D1I(s)->send_cookie) { | 272 | if (SSL_is_dtls(s) && s->d1->send_cookie) { |
| 273 | S3I(s)->hs.state = SSL3_ST_CW_FLUSH; | 273 | S3I(s)->hs.state = SSL3_ST_CW_FLUSH; |
| 274 | S3I(s)->hs.tls12.next_state = SSL3_ST_CR_SRVR_HELLO_A; | 274 | S3I(s)->hs.tls12.next_state = SSL3_ST_CR_SRVR_HELLO_A; |
| 275 | } else | 275 | } else |
| @@ -314,7 +314,7 @@ ssl3_connect(SSL *s) | |||
| 314 | if (ret <= 0) | 314 | if (ret <= 0) |
| 315 | goto end; | 315 | goto end; |
| 316 | dtls1_stop_timer(s); | 316 | dtls1_stop_timer(s); |
| 317 | if (D1I(s)->send_cookie) /* start again, with a cookie */ | 317 | if (s->d1->send_cookie) /* start again, with a cookie */ |
| 318 | S3I(s)->hs.state = SSL3_ST_CW_CLNT_HELLO_A; | 318 | S3I(s)->hs.state = SSL3_ST_CW_CLNT_HELLO_A; |
| 319 | else | 319 | else |
| 320 | S3I(s)->hs.state = SSL3_ST_CR_CERT_A; | 320 | S3I(s)->hs.state = SSL3_ST_CR_CERT_A; |
| @@ -529,7 +529,7 @@ ssl3_connect(SSL *s) | |||
| 529 | case SSL3_ST_CR_FINISHED_A: | 529 | case SSL3_ST_CR_FINISHED_A: |
| 530 | case SSL3_ST_CR_FINISHED_B: | 530 | case SSL3_ST_CR_FINISHED_B: |
| 531 | if (SSL_is_dtls(s)) | 531 | if (SSL_is_dtls(s)) |
| 532 | D1I(s)->change_cipher_spec_ok = 1; | 532 | s->d1->change_cipher_spec_ok = 1; |
| 533 | else | 533 | else |
| 534 | s->s3->flags |= SSL3_FLAGS_CCS_OK; | 534 | s->s3->flags |= SSL3_FLAGS_CCS_OK; |
| 535 | ret = ssl3_get_finished(s, SSL3_ST_CR_FINISHED_A, | 535 | ret = ssl3_get_finished(s, SSL3_ST_CR_FINISHED_A, |
| @@ -595,8 +595,8 @@ ssl3_connect(SSL *s) | |||
| 595 | 595 | ||
| 596 | if (SSL_is_dtls(s)) { | 596 | if (SSL_is_dtls(s)) { |
| 597 | /* done with handshaking */ | 597 | /* done with handshaking */ |
| 598 | D1I(s)->handshake_read_seq = 0; | 598 | s->d1->handshake_read_seq = 0; |
| 599 | D1I(s)->next_handshake_write_seq = 0; | 599 | s->d1->next_handshake_write_seq = 0; |
| 600 | } | 600 | } |
| 601 | 601 | ||
| 602 | goto end; | 602 | goto end; |
| @@ -666,7 +666,7 @@ ssl3_send_client_hello(SSL *s) | |||
| 666 | * HelloVerifyRequest, we must retain the original client | 666 | * HelloVerifyRequest, we must retain the original client |
| 667 | * random value. | 667 | * random value. |
| 668 | */ | 668 | */ |
| 669 | if (!SSL_is_dtls(s) || D1I(s)->send_cookie == 0) | 669 | if (!SSL_is_dtls(s) || s->d1->send_cookie == 0) |
| 670 | arc4random_buf(s->s3->client_random, SSL3_RANDOM_SIZE); | 670 | arc4random_buf(s->s3->client_random, SSL3_RANDOM_SIZE); |
| 671 | 671 | ||
| 672 | if (!ssl3_handshake_msg_start(s, &cbb, &client_hello, | 672 | if (!ssl3_handshake_msg_start(s, &cbb, &client_hello, |
| @@ -728,14 +728,14 @@ ssl3_send_client_hello(SSL *s) | |||
| 728 | 728 | ||
| 729 | /* DTLS Cookie. */ | 729 | /* DTLS Cookie. */ |
| 730 | if (SSL_is_dtls(s)) { | 730 | if (SSL_is_dtls(s)) { |
| 731 | if (D1I(s)->cookie_len > sizeof(D1I(s)->cookie)) { | 731 | if (s->d1->cookie_len > sizeof(s->d1->cookie)) { |
| 732 | SSLerror(s, ERR_R_INTERNAL_ERROR); | 732 | SSLerror(s, ERR_R_INTERNAL_ERROR); |
| 733 | goto err; | 733 | goto err; |
| 734 | } | 734 | } |
| 735 | if (!CBB_add_u8_length_prefixed(&client_hello, &cookie)) | 735 | if (!CBB_add_u8_length_prefixed(&client_hello, &cookie)) |
| 736 | goto err; | 736 | goto err; |
| 737 | if (!CBB_add_bytes(&cookie, D1I(s)->cookie, | 737 | if (!CBB_add_bytes(&cookie, s->d1->cookie, |
| 738 | D1I(s)->cookie_len)) | 738 | s->d1->cookie_len)) |
| 739 | goto err; | 739 | goto err; |
| 740 | } | 740 | } |
| 741 | 741 | ||
| @@ -789,7 +789,7 @@ ssl3_get_dtls_hello_verify(SSL *s) | |||
| 789 | return ret; | 789 | return ret; |
| 790 | 790 | ||
| 791 | if (S3I(s)->hs.tls12.message_type != DTLS1_MT_HELLO_VERIFY_REQUEST) { | 791 | if (S3I(s)->hs.tls12.message_type != DTLS1_MT_HELLO_VERIFY_REQUEST) { |
| 792 | D1I(s)->send_cookie = 0; | 792 | s->d1->send_cookie = 0; |
| 793 | S3I(s)->hs.tls12.reuse_message = 1; | 793 | S3I(s)->hs.tls12.reuse_message = 1; |
| 794 | return (1); | 794 | return (1); |
| 795 | } | 795 | } |
| @@ -819,14 +819,14 @@ ssl3_get_dtls_hello_verify(SSL *s) | |||
| 819 | goto fatal_err; | 819 | goto fatal_err; |
| 820 | } | 820 | } |
| 821 | 821 | ||
| 822 | if (!CBS_write_bytes(&cookie, D1I(s)->cookie, | 822 | if (!CBS_write_bytes(&cookie, s->d1->cookie, |
| 823 | sizeof(D1I(s)->cookie), &cookie_len)) { | 823 | sizeof(s->d1->cookie), &cookie_len)) { |
| 824 | D1I(s)->cookie_len = 0; | 824 | s->d1->cookie_len = 0; |
| 825 | al = SSL_AD_ILLEGAL_PARAMETER; | 825 | al = SSL_AD_ILLEGAL_PARAMETER; |
| 826 | goto fatal_err; | 826 | goto fatal_err; |
| 827 | } | 827 | } |
| 828 | D1I(s)->cookie_len = cookie_len; | 828 | s->d1->cookie_len = cookie_len; |
| 829 | D1I(s)->send_cookie = 1; | 829 | s->d1->send_cookie = 1; |
| 830 | 830 | ||
| 831 | return 1; | 831 | return 1; |
| 832 | 832 | ||
| @@ -862,7 +862,7 @@ ssl3_get_server_hello(SSL *s) | |||
| 862 | 862 | ||
| 863 | if (SSL_is_dtls(s)) { | 863 | if (SSL_is_dtls(s)) { |
| 864 | if (S3I(s)->hs.tls12.message_type == DTLS1_MT_HELLO_VERIFY_REQUEST) { | 864 | if (S3I(s)->hs.tls12.message_type == DTLS1_MT_HELLO_VERIFY_REQUEST) { |
| 865 | if (D1I(s)->send_cookie == 0) { | 865 | if (s->d1->send_cookie == 0) { |
| 866 | S3I(s)->hs.tls12.reuse_message = 1; | 866 | S3I(s)->hs.tls12.reuse_message = 1; |
| 867 | return (1); | 867 | return (1); |
| 868 | } else { | 868 | } else { |
