summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_srvr.c
diff options
context:
space:
mode:
authorjsing <>2017-01-26 06:32:58 +0000
committerjsing <>2017-01-26 06:32:58 +0000
commitaa0037c390e8abacf9713cd2521b1b3f265af0e9 (patch)
tree09a483692ecb3d9b3259d70bca4f0473c356e0f5 /src/lib/libssl/ssl_srvr.c
parent49b29010b73e2191c70fb3c541ef163c31dc59f6 (diff)
downloadopenbsd-aa0037c390e8abacf9713cd2521b1b3f265af0e9.tar.gz
openbsd-aa0037c390e8abacf9713cd2521b1b3f265af0e9.tar.bz2
openbsd-aa0037c390e8abacf9713cd2521b1b3f265af0e9.zip
Remove most of SSL3_ENC_METHOD - we can just inline the function calls
and defines since they are the same everywhere. ok beck@
Diffstat (limited to 'src/lib/libssl/ssl_srvr.c')
-rw-r--r--src/lib/libssl/ssl_srvr.c22
1 files changed, 11 insertions, 11 deletions
diff --git a/src/lib/libssl/ssl_srvr.c b/src/lib/libssl/ssl_srvr.c
index dfc6ee67b6..a716947ab9 100644
--- a/src/lib/libssl/ssl_srvr.c
+++ b/src/lib/libssl/ssl_srvr.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_srvr.c,v 1.1 2017/01/26 05:51:54 jsing Exp $ */ 1/* $OpenBSD: ssl_srvr.c,v 1.2 2017/01/26 06:32:58 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -519,7 +519,7 @@ ssl3_accept(SSL *s)
519 if (S3I(s)->handshake_dgst[dgst_num]) { 519 if (S3I(s)->handshake_dgst[dgst_num]) {
520 int dgst_size; 520 int dgst_size;
521 521
522 s->method->internal->ssl3_enc->cert_verify_mac(s, 522 tls1_cert_verify_mac(s,
523 EVP_MD_CTX_type( 523 EVP_MD_CTX_type(
524 S3I(s)->handshake_dgst[dgst_num]), 524 S3I(s)->handshake_dgst[dgst_num]),
525 &(S3I(s)->tmp.cert_verify_md[offset])); 525 &(S3I(s)->tmp.cert_verify_md[offset]));
@@ -598,7 +598,7 @@ ssl3_accept(SSL *s)
598 case SSL3_ST_SW_CHANGE_B: 598 case SSL3_ST_SW_CHANGE_B:
599 599
600 s->session->cipher = S3I(s)->tmp.new_cipher; 600 s->session->cipher = S3I(s)->tmp.new_cipher;
601 if (!s->method->internal->ssl3_enc->setup_key_block(s)) { 601 if (!tls1_setup_key_block(s)) {
602 ret = -1; 602 ret = -1;
603 goto end; 603 goto end;
604 } 604 }
@@ -611,7 +611,7 @@ ssl3_accept(SSL *s)
611 s->internal->state = SSL3_ST_SW_FINISHED_A; 611 s->internal->state = SSL3_ST_SW_FINISHED_A;
612 s->internal->init_num = 0; 612 s->internal->init_num = 0;
613 613
614 if (!s->method->internal->ssl3_enc->change_cipher_state( 614 if (!tls1_change_cipher_state(
615 s, SSL3_CHANGE_CIPHER_SERVER_WRITE)) { 615 s, SSL3_CHANGE_CIPHER_SERVER_WRITE)) {
616 ret = -1; 616 ret = -1;
617 goto end; 617 goto end;
@@ -623,8 +623,8 @@ ssl3_accept(SSL *s)
623 case SSL3_ST_SW_FINISHED_B: 623 case SSL3_ST_SW_FINISHED_B:
624 ret = ssl3_send_finished(s, 624 ret = ssl3_send_finished(s,
625 SSL3_ST_SW_FINISHED_A, SSL3_ST_SW_FINISHED_B, 625 SSL3_ST_SW_FINISHED_A, SSL3_ST_SW_FINISHED_B,
626 s->method->internal->ssl3_enc->server_finished_label, 626 TLS_MD_SERVER_FINISH_CONST,
627 s->method->internal->ssl3_enc->server_finished_label_len); 627 TLS_MD_SERVER_FINISH_CONST_SIZE);
628 if (ret <= 0) 628 if (ret <= 0)
629 goto end; 629 goto end;
630 s->internal->state = SSL3_ST_SW_FLUSH; 630 s->internal->state = SSL3_ST_SW_FLUSH;
@@ -1808,7 +1808,7 @@ ssl3_get_client_kex_rsa(SSL *s, unsigned char *p, long n)
1808 } 1808 }
1809 1809
1810 s->session->master_key_length = 1810 s->session->master_key_length =
1811 s->method->internal->ssl3_enc->generate_master_secret(s, 1811 tls1_generate_master_secret(s,
1812 s->session->master_key, p, i); 1812 s->session->master_key, p, i);
1813 1813
1814 explicit_bzero(p, i); 1814 explicit_bzero(p, i);
@@ -1864,7 +1864,7 @@ ssl3_get_client_kex_dhe(SSL *s, unsigned char *p, long n)
1864 } 1864 }
1865 1865
1866 s->session->master_key_length = 1866 s->session->master_key_length =
1867 s->method->internal->ssl3_enc->generate_master_secret( 1867 tls1_generate_master_secret(
1868 s, s->session->master_key, p, key_size); 1868 s, s->session->master_key, p, key_size);
1869 1869
1870 explicit_bzero(p, key_size); 1870 explicit_bzero(p, key_size);
@@ -2018,7 +2018,7 @@ ssl3_get_client_kex_ecdhe_ecp(SSL *s, unsigned char *p, long n)
2018 2018
2019 /* Compute the master secret */ 2019 /* Compute the master secret */
2020 s->session->master_key_length = 2020 s->session->master_key_length =
2021 s->method->internal->ssl3_enc->generate_master_secret( 2021 tls1_generate_master_secret(
2022 s, s->session->master_key, p, i); 2022 s, s->session->master_key, p, i);
2023 2023
2024 explicit_bzero(p, i); 2024 explicit_bzero(p, i);
@@ -2060,7 +2060,7 @@ ssl3_get_client_kex_ecdhe_ecx(SSL *s, unsigned char *p, long n)
2060 S3I(s)->tmp.x25519 = NULL; 2060 S3I(s)->tmp.x25519 = NULL;
2061 2061
2062 s->session->master_key_length = 2062 s->session->master_key_length =
2063 s->method->internal->ssl3_enc->generate_master_secret( 2063 tls1_generate_master_secret(
2064 s, s->session->master_key, shared_key, X25519_KEY_LENGTH); 2064 s, s->session->master_key, shared_key, X25519_KEY_LENGTH);
2065 2065
2066 ret = 1; 2066 ret = 1;
@@ -2136,7 +2136,7 @@ ssl3_get_client_kex_gost(SSL *s, unsigned char *p, long n)
2136 } 2136 }
2137 /* Generate master secret */ 2137 /* Generate master secret */
2138 s->session->master_key_length = 2138 s->session->master_key_length =
2139 s->method->internal->ssl3_enc->generate_master_secret( 2139 tls1_generate_master_secret(
2140 s, s->session->master_key, premaster_secret, 32); 2140 s, s->session->master_key, premaster_secret, 32);
2141 /* Check if pubkey from client certificate was used */ 2141 /* Check if pubkey from client certificate was used */
2142 if (EVP_PKEY_CTX_ctrl(pkey_ctx, -1, -1, 2142 if (EVP_PKEY_CTX_ctrl(pkey_ctx, -1, -1,