summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_lib.c
diff options
context:
space:
mode:
authorjsing <>2017-01-22 09:02:07 +0000
committerjsing <>2017-01-22 09:02:07 +0000
commitfcfe199cc99431d4e250ada852b3989b210b67ca (patch)
tree74edac7239262d369a6f63b69bea3291a4184000 /src/lib/libssl/ssl_lib.c
parent0356ccc6b32439d6cef453be9bd3c4786baa75d3 (diff)
downloadopenbsd-fcfe199cc99431d4e250ada852b3989b210b67ca.tar.gz
openbsd-fcfe199cc99431d4e250ada852b3989b210b67ca.tar.bz2
openbsd-fcfe199cc99431d4e250ada852b3989b210b67ca.zip
Move most of the SSL3_STATE fields to internal - the ones that remain are
known to be used by ports. ok beck@
Diffstat (limited to 'src/lib/libssl/ssl_lib.c')
-rw-r--r--src/lib/libssl/ssl_lib.c32
1 files changed, 16 insertions, 16 deletions
diff --git a/src/lib/libssl/ssl_lib.c b/src/lib/libssl/ssl_lib.c
index 50c764ae86..96aea4c5dd 100644
--- a/src/lib/libssl/ssl_lib.c
+++ b/src/lib/libssl/ssl_lib.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_lib.c,v 1.128 2017/01/22 07:16:39 beck Exp $ */ 1/* $OpenBSD: ssl_lib.c,v 1.129 2017/01/22 09:02:07 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -702,10 +702,10 @@ SSL_get_finished(const SSL *s, void *buf, size_t count)
702 size_t ret = 0; 702 size_t ret = 0;
703 703
704 if (s->s3 != NULL) { 704 if (s->s3 != NULL) {
705 ret = s->s3->tmp.finish_md_len; 705 ret = S3I(s)->tmp.finish_md_len;
706 if (count > ret) 706 if (count > ret)
707 count = ret; 707 count = ret;
708 memcpy(buf, s->s3->tmp.finish_md, count); 708 memcpy(buf, S3I(s)->tmp.finish_md, count);
709 } 709 }
710 return (ret); 710 return (ret);
711} 711}
@@ -717,10 +717,10 @@ SSL_get_peer_finished(const SSL *s, void *buf, size_t count)
717 size_t ret = 0; 717 size_t ret = 0;
718 718
719 if (s->s3 != NULL) { 719 if (s->s3 != NULL) {
720 ret = s->s3->tmp.peer_finish_md_len; 720 ret = S3I(s)->tmp.peer_finish_md_len;
721 if (count > ret) 721 if (count > ret)
722 count = ret; 722 count = ret;
723 memcpy(buf, s->s3->tmp.peer_finish_md, count); 723 memcpy(buf, S3I(s)->tmp.peer_finish_md, count);
724 } 724 }
725 return (ret); 725 return (ret);
726} 726}
@@ -1089,7 +1089,7 @@ SSL_ctrl(SSL *s, int cmd, long larg, void *parg)
1089 return (1); 1089 return (1);
1090 case SSL_CTRL_GET_RI_SUPPORT: 1090 case SSL_CTRL_GET_RI_SUPPORT:
1091 if (s->s3) 1091 if (s->s3)
1092 return (s->s3->send_connection_binding); 1092 return (S3I(s)->send_connection_binding);
1093 else return (0); 1093 else return (0);
1094 default: 1094 default:
1095 return (s->method->ssl_ctrl(s, cmd, larg, parg)); 1095 return (s->method->ssl_ctrl(s, cmd, larg, parg));
@@ -1425,7 +1425,7 @@ ssl_bytes_to_cipher_list(SSL *s, const unsigned char *p, int num)
1425 uint16_t cipher_value, max_version; 1425 uint16_t cipher_value, max_version;
1426 1426
1427 if (s->s3) 1427 if (s->s3)
1428 s->s3->send_connection_binding = 0; 1428 S3I(s)->send_connection_binding = 0;
1429 1429
1430 /* 1430 /*
1431 * RFC 5246 section 7.4.1.2 defines the interval as [2,2^16-2]. 1431 * RFC 5246 section 7.4.1.2 defines the interval as [2,2^16-2].
@@ -1464,7 +1464,7 @@ ssl_bytes_to_cipher_list(SSL *s, const unsigned char *p, int num)
1464 1464
1465 goto err; 1465 goto err;
1466 } 1466 }
1467 s->s3->send_connection_binding = 1; 1467 S3I(s)->send_connection_binding = 1;
1468 continue; 1468 continue;
1469 } 1469 }
1470 1470
@@ -1725,8 +1725,8 @@ SSL_get0_alpn_selected(const SSL *ssl, const unsigned char **data,
1725 *len = 0; 1725 *len = 0;
1726 1726
1727 if (ssl->s3 != NULL) { 1727 if (ssl->s3 != NULL) {
1728 *data = ssl->s3->alpn_selected; 1728 *data = ssl->s3->internal->alpn_selected;
1729 *len = ssl->s3->alpn_selected_len; 1729 *len = ssl->s3->internal->alpn_selected_len;
1730 } 1730 }
1731} 1731}
1732 1732
@@ -2119,7 +2119,7 @@ ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher)
2119int 2119int
2120ssl_check_srvr_ecc_cert_and_alg(X509 *x, SSL *s) 2120ssl_check_srvr_ecc_cert_and_alg(X509 *x, SSL *s)
2121{ 2121{
2122 const SSL_CIPHER *cs = s->s3->tmp.new_cipher; 2122 const SSL_CIPHER *cs = S3I(s)->tmp.new_cipher;
2123 unsigned long alg_a; 2123 unsigned long alg_a;
2124 2124
2125 alg_a = cs->algorithm_auth; 2125 alg_a = cs->algorithm_auth;
@@ -2148,9 +2148,9 @@ ssl_get_server_send_pkey(const SSL *s)
2148 int i; 2148 int i;
2149 2149
2150 c = s->cert; 2150 c = s->cert;
2151 ssl_set_cert_masks(c, s->s3->tmp.new_cipher); 2151 ssl_set_cert_masks(c, S3I(s)->tmp.new_cipher);
2152 2152
2153 alg_a = s->s3->tmp.new_cipher->algorithm_auth; 2153 alg_a = S3I(s)->tmp.new_cipher->algorithm_auth;
2154 2154
2155 if (alg_a & SSL_aECDSA) { 2155 if (alg_a & SSL_aECDSA) {
2156 i = SSL_PKEY_ECC; 2156 i = SSL_PKEY_ECC;
@@ -2221,9 +2221,9 @@ ssl_get_auto_dh(SSL *s)
2221 2221
2222 if (s->cert->dh_tmp_auto == 2) { 2222 if (s->cert->dh_tmp_auto == 2) {
2223 keylen = 1024; 2223 keylen = 1024;
2224 } else if (s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) { 2224 } else if (S3I(s)->tmp.new_cipher->algorithm_auth & SSL_aNULL) {
2225 keylen = 1024; 2225 keylen = 1024;
2226 if (s->s3->tmp.new_cipher->strength_bits == 256) 2226 if (S3I(s)->tmp.new_cipher->strength_bits == 256)
2227 keylen = 3072; 2227 keylen = 3072;
2228 } else { 2228 } else {
2229 if ((cpk = ssl_get_server_send_pkey(s)) == NULL) 2229 if ((cpk = ssl_get_server_send_pkey(s)) == NULL)
@@ -2396,7 +2396,7 @@ SSL_get_error(const SSL *s, int i)
2396 2396
2397 if (i == 0) { 2397 if (i == 0) {
2398 if ((s->shutdown & SSL_RECEIVED_SHUTDOWN) && 2398 if ((s->shutdown & SSL_RECEIVED_SHUTDOWN) &&
2399 (s->s3->warn_alert == SSL_AD_CLOSE_NOTIFY)) 2399 (S3I(s)->warn_alert == SSL_AD_CLOSE_NOTIFY))
2400 return (SSL_ERROR_ZERO_RETURN); 2400 return (SSL_ERROR_ZERO_RETURN);
2401 } 2401 }
2402 return (SSL_ERROR_SYSCALL); 2402 return (SSL_ERROR_SYSCALL);