summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_srvr.c
diff options
context:
space:
mode:
authorjsing <>2018-08-24 17:30:32 +0000
committerjsing <>2018-08-24 17:30:32 +0000
commit4ca92876cd1aa45f9ac5ea123afc11e1ef4574cb (patch)
treee155083a9870a0f69abb8ecb24bb8173c2a5a5c6 /src/lib/libssl/ssl_srvr.c
parent889f96509d5657ac456e0494e76acae731f1fc78 (diff)
downloadopenbsd-4ca92876cd1aa45f9ac5ea123afc11e1ef4574cb.tar.gz
openbsd-4ca92876cd1aa45f9ac5ea123afc11e1ef4574cb.tar.bz2
openbsd-4ca92876cd1aa45f9ac5ea123afc11e1ef4574cb.zip
Clean up handshake message start/finish functions.
Now that all handshake messages are created using CBB, remove the non-CBB ssl3_handshake_msg_start()/ssl3_handshake_msg_finish() functions. Rename the CBB variants by dropping the _cbb suffix. ok bcook@ inoguchi@ tb@
Diffstat (limited to 'src/lib/libssl/ssl_srvr.c')
-rw-r--r--src/lib/libssl/ssl_srvr.c34
1 files changed, 17 insertions, 17 deletions
diff --git a/src/lib/libssl/ssl_srvr.c b/src/lib/libssl/ssl_srvr.c
index 3cf6d9a3cb..745fd6d83a 100644
--- a/src/lib/libssl/ssl_srvr.c
+++ b/src/lib/libssl/ssl_srvr.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_srvr.c,v 1.42 2018/08/22 17:46:29 jsing Exp $ */ 1/* $OpenBSD: ssl_srvr.c,v 1.43 2018/08/24 17:30:32 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -784,10 +784,10 @@ ssl3_send_hello_request(SSL *s)
784 memset(&cbb, 0, sizeof(cbb)); 784 memset(&cbb, 0, sizeof(cbb));
785 785
786 if (S3I(s)->hs.state == SSL3_ST_SW_HELLO_REQ_A) { 786 if (S3I(s)->hs.state == SSL3_ST_SW_HELLO_REQ_A) {
787 if (!ssl3_handshake_msg_start_cbb(s, &cbb, &hello, 787 if (!ssl3_handshake_msg_start(s, &cbb, &hello,
788 SSL3_MT_HELLO_REQUEST)) 788 SSL3_MT_HELLO_REQUEST))
789 goto err; 789 goto err;
790 if (!ssl3_handshake_msg_finish_cbb(s, &cbb)) 790 if (!ssl3_handshake_msg_finish(s, &cbb))
791 goto err; 791 goto err;
792 792
793 S3I(s)->hs.state = SSL3_ST_SW_HELLO_REQ_B; 793 S3I(s)->hs.state = SSL3_ST_SW_HELLO_REQ_B;
@@ -1175,7 +1175,7 @@ ssl3_send_server_hello(SSL *s)
1175 memset(&cbb, 0, sizeof(cbb)); 1175 memset(&cbb, 0, sizeof(cbb));
1176 1176
1177 if (S3I(s)->hs.state == SSL3_ST_SW_SRVR_HELLO_A) { 1177 if (S3I(s)->hs.state == SSL3_ST_SW_SRVR_HELLO_A) {
1178 if (!ssl3_handshake_msg_start_cbb(s, &cbb, &server_hello, 1178 if (!ssl3_handshake_msg_start(s, &cbb, &server_hello,
1179 SSL3_MT_SERVER_HELLO)) 1179 SSL3_MT_SERVER_HELLO))
1180 goto err; 1180 goto err;
1181 1181
@@ -1232,7 +1232,7 @@ ssl3_send_server_hello(SSL *s)
1232 goto err; 1232 goto err;
1233 } 1233 }
1234 1234
1235 if (!ssl3_handshake_msg_finish_cbb(s, &cbb)) 1235 if (!ssl3_handshake_msg_finish(s, &cbb))
1236 goto err; 1236 goto err;
1237 } 1237 }
1238 1238
@@ -1253,10 +1253,10 @@ ssl3_send_server_done(SSL *s)
1253 memset(&cbb, 0, sizeof(cbb)); 1253 memset(&cbb, 0, sizeof(cbb));
1254 1254
1255 if (S3I(s)->hs.state == SSL3_ST_SW_SRVR_DONE_A) { 1255 if (S3I(s)->hs.state == SSL3_ST_SW_SRVR_DONE_A) {
1256 if (!ssl3_handshake_msg_start_cbb(s, &cbb, &done, 1256 if (!ssl3_handshake_msg_start(s, &cbb, &done,
1257 SSL3_MT_SERVER_DONE)) 1257 SSL3_MT_SERVER_DONE))
1258 goto err; 1258 goto err;
1259 if (!ssl3_handshake_msg_finish_cbb(s, &cbb)) 1259 if (!ssl3_handshake_msg_finish(s, &cbb))
1260 goto err; 1260 goto err;
1261 1261
1262 S3I(s)->hs.state = SSL3_ST_SW_SRVR_DONE_B; 1262 S3I(s)->hs.state = SSL3_ST_SW_SRVR_DONE_B;
@@ -1519,7 +1519,7 @@ ssl3_send_server_key_exchange(SSL *s)
1519 1519
1520 if (S3I(s)->hs.state == SSL3_ST_SW_KEY_EXCH_A) { 1520 if (S3I(s)->hs.state == SSL3_ST_SW_KEY_EXCH_A) {
1521 1521
1522 if (!ssl3_handshake_msg_start_cbb(s, &cbb, &server_kex, 1522 if (!ssl3_handshake_msg_start(s, &cbb, &server_kex,
1523 SSL3_MT_SERVER_KEY_EXCHANGE)) 1523 SSL3_MT_SERVER_KEY_EXCHANGE))
1524 goto err; 1524 goto err;
1525 1525
@@ -1600,7 +1600,7 @@ ssl3_send_server_key_exchange(SSL *s)
1600 goto err; 1600 goto err;
1601 } 1601 }
1602 1602
1603 if (!ssl3_handshake_msg_finish_cbb(s, &cbb)) 1603 if (!ssl3_handshake_msg_finish(s, &cbb))
1604 goto err; 1604 goto err;
1605 1605
1606 S3I(s)->hs.state = SSL3_ST_SW_KEY_EXCH_B; 1606 S3I(s)->hs.state = SSL3_ST_SW_KEY_EXCH_B;
@@ -1639,7 +1639,7 @@ ssl3_send_certificate_request(SSL *s)
1639 memset(&cbb, 0, sizeof(cbb)); 1639 memset(&cbb, 0, sizeof(cbb));
1640 1640
1641 if (S3I(s)->hs.state == SSL3_ST_SW_CERT_REQ_A) { 1641 if (S3I(s)->hs.state == SSL3_ST_SW_CERT_REQ_A) {
1642 if (!ssl3_handshake_msg_start_cbb(s, &cbb, &cert_request, 1642 if (!ssl3_handshake_msg_start(s, &cbb, &cert_request,
1643 SSL3_MT_CERTIFICATE_REQUEST)) 1643 SSL3_MT_CERTIFICATE_REQUEST))
1644 goto err; 1644 goto err;
1645 1645
@@ -1679,7 +1679,7 @@ ssl3_send_certificate_request(SSL *s)
1679 goto err; 1679 goto err;
1680 } 1680 }
1681 1681
1682 if (!ssl3_handshake_msg_finish_cbb(s, &cbb)) 1682 if (!ssl3_handshake_msg_finish(s, &cbb))
1683 goto err; 1683 goto err;
1684 1684
1685 S3I(s)->hs.state = SSL3_ST_SW_CERT_REQ_B; 1685 S3I(s)->hs.state = SSL3_ST_SW_CERT_REQ_B;
@@ -2502,12 +2502,12 @@ ssl3_send_server_certificate(SSL *s)
2502 return (0); 2502 return (0);
2503 } 2503 }
2504 2504
2505 if (!ssl3_handshake_msg_start_cbb(s, &cbb, &server_cert, 2505 if (!ssl3_handshake_msg_start(s, &cbb, &server_cert,
2506 SSL3_MT_CERTIFICATE)) 2506 SSL3_MT_CERTIFICATE))
2507 goto err; 2507 goto err;
2508 if (!ssl3_output_cert_chain(s, &server_cert, x)) 2508 if (!ssl3_output_cert_chain(s, &server_cert, x))
2509 goto err; 2509 goto err;
2510 if (!ssl3_handshake_msg_finish_cbb(s, &cbb)) 2510 if (!ssl3_handshake_msg_finish(s, &cbb))
2511 goto err; 2511 goto err;
2512 2512
2513 S3I(s)->hs.state = SSL3_ST_SW_CERT_B; 2513 S3I(s)->hs.state = SSL3_ST_SW_CERT_B;
@@ -2548,7 +2548,7 @@ ssl3_send_newsession_ticket(SSL *s)
2548 memset(&cbb, 0, sizeof(cbb)); 2548 memset(&cbb, 0, sizeof(cbb));
2549 2549
2550 if (S3I(s)->hs.state == SSL3_ST_SW_SESSION_TICKET_A) { 2550 if (S3I(s)->hs.state == SSL3_ST_SW_SESSION_TICKET_A) {
2551 if (!ssl3_handshake_msg_start_cbb(s, &cbb, &session_ticket, 2551 if (!ssl3_handshake_msg_start(s, &cbb, &session_ticket,
2552 SSL3_MT_NEWSESSION_TICKET)) 2552 SSL3_MT_NEWSESSION_TICKET))
2553 goto err; 2553 goto err;
2554 2554
@@ -2657,7 +2657,7 @@ ssl3_send_newsession_ticket(SSL *s)
2657 if (!HMAC_Final(&hctx, hmac, &hlen)) 2657 if (!HMAC_Final(&hctx, hmac, &hlen))
2658 goto err; 2658 goto err;
2659 2659
2660 if (!ssl3_handshake_msg_finish_cbb(s, &cbb)) 2660 if (!ssl3_handshake_msg_finish(s, &cbb))
2661 goto err; 2661 goto err;
2662 2662
2663 S3I(s)->hs.state = SSL3_ST_SW_SESSION_TICKET_B; 2663 S3I(s)->hs.state = SSL3_ST_SW_SESSION_TICKET_B;
@@ -2689,7 +2689,7 @@ ssl3_send_cert_status(SSL *s)
2689 memset(&cbb, 0, sizeof(cbb)); 2689 memset(&cbb, 0, sizeof(cbb));
2690 2690
2691 if (S3I(s)->hs.state == SSL3_ST_SW_CERT_STATUS_A) { 2691 if (S3I(s)->hs.state == SSL3_ST_SW_CERT_STATUS_A) {
2692 if (!ssl3_handshake_msg_start_cbb(s, &cbb, &certstatus, 2692 if (!ssl3_handshake_msg_start(s, &cbb, &certstatus,
2693 SSL3_MT_CERTIFICATE_STATUS)) 2693 SSL3_MT_CERTIFICATE_STATUS))
2694 goto err; 2694 goto err;
2695 if (!CBB_add_u8(&certstatus, s->tlsext_status_type)) 2695 if (!CBB_add_u8(&certstatus, s->tlsext_status_type))
@@ -2699,7 +2699,7 @@ ssl3_send_cert_status(SSL *s)
2699 if (!CBB_add_bytes(&ocspresp, s->internal->tlsext_ocsp_resp, 2699 if (!CBB_add_bytes(&ocspresp, s->internal->tlsext_ocsp_resp,
2700 s->internal->tlsext_ocsp_resplen)) 2700 s->internal->tlsext_ocsp_resplen))
2701 goto err; 2701 goto err;
2702 if (!ssl3_handshake_msg_finish_cbb(s, &cbb)) 2702 if (!ssl3_handshake_msg_finish(s, &cbb))
2703 goto err; 2703 goto err;
2704 2704
2705 S3I(s)->hs.state = SSL3_ST_SW_CERT_STATUS_B; 2705 S3I(s)->hs.state = SSL3_ST_SW_CERT_STATUS_B;