diff options
author | jsing <> | 2017-10-08 16:46:31 +0000 |
---|---|---|
committer | jsing <> | 2017-10-08 16:46:31 +0000 |
commit | 800c39ad0b8765bdbf6cec4a8f02a9cbbacb1dfe (patch) | |
tree | 6db9525c9f1a539b0d0f1630022d17810c1a5d2e /src/lib | |
parent | d2e8ad1f2205caba4255fe49dcc60abcddfa2ae8 (diff) | |
download | openbsd-800c39ad0b8765bdbf6cec4a8f02a9cbbacb1dfe.tar.gz openbsd-800c39ad0b8765bdbf6cec4a8f02a9cbbacb1dfe.tar.bz2 openbsd-800c39ad0b8765bdbf6cec4a8f02a9cbbacb1dfe.zip |
Fix some style/whitespace/indentation issues in ssl3_accept().
Diffstat (limited to 'src/lib')
-rw-r--r-- | src/lib/libssl/ssl_srvr.c | 39 |
1 files changed, 14 insertions, 25 deletions
diff --git a/src/lib/libssl/ssl_srvr.c b/src/lib/libssl/ssl_srvr.c index c43d63d991..686d8c8db6 100644 --- a/src/lib/libssl/ssl_srvr.c +++ b/src/lib/libssl/ssl_srvr.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_srvr.c,v 1.22 2017/08/12 21:47:59 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_srvr.c,v 1.23 2017/10/08 16:46:31 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -170,8 +170,8 @@ | |||
170 | int | 170 | int |
171 | ssl3_accept(SSL *s) | 171 | ssl3_accept(SSL *s) |
172 | { | 172 | { |
173 | unsigned long alg_k; | ||
174 | void (*cb)(const SSL *ssl, int type, int val) = NULL; | 173 | void (*cb)(const SSL *ssl, int type, int val) = NULL; |
174 | unsigned long alg_k; | ||
175 | int ret = -1; | 175 | int ret = -1; |
176 | int new_state, state, skip = 0; | 176 | int new_state, state, skip = 0; |
177 | 177 | ||
@@ -206,7 +206,6 @@ ssl3_accept(SSL *s) | |||
206 | case SSL_ST_ACCEPT: | 206 | case SSL_ST_ACCEPT: |
207 | case SSL_ST_BEFORE|SSL_ST_ACCEPT: | 207 | case SSL_ST_BEFORE|SSL_ST_ACCEPT: |
208 | case SSL_ST_OK|SSL_ST_ACCEPT: | 208 | case SSL_ST_OK|SSL_ST_ACCEPT: |
209 | |||
210 | s->server = 1; | 209 | s->server = 1; |
211 | if (cb != NULL) | 210 | if (cb != NULL) |
212 | cb(s, SSL_CB_HANDSHAKE_START, 1); | 211 | cb(s, SSL_CB_HANDSHAKE_START, 1); |
@@ -239,7 +238,6 @@ ssl3_accept(SSL *s) | |||
239 | ret = -1; | 238 | ret = -1; |
240 | goto end; | 239 | goto end; |
241 | } | 240 | } |
242 | |||
243 | if (!tls1_init_finished_mac(s)) { | 241 | if (!tls1_init_finished_mac(s)) { |
244 | ret = -1; | 242 | ret = -1; |
245 | goto end; | 243 | goto end; |
@@ -261,7 +259,7 @@ ssl3_accept(SSL *s) | |||
261 | } else { | 259 | } else { |
262 | /* | 260 | /* |
263 | * S3I(s)->hs.state == SSL_ST_RENEGOTIATE, | 261 | * S3I(s)->hs.state == SSL_ST_RENEGOTIATE, |
264 | * we will just send a HelloRequest | 262 | * we will just send a HelloRequest. |
265 | */ | 263 | */ |
266 | s->ctx->internal->stats.sess_accept_renegotiate++; | 264 | s->ctx->internal->stats.sess_accept_renegotiate++; |
267 | S3I(s)->hs.state = SSL3_ST_SW_HELLO_REQ_A; | 265 | S3I(s)->hs.state = SSL3_ST_SW_HELLO_REQ_A; |
@@ -270,7 +268,6 @@ ssl3_accept(SSL *s) | |||
270 | 268 | ||
271 | case SSL3_ST_SW_HELLO_REQ_A: | 269 | case SSL3_ST_SW_HELLO_REQ_A: |
272 | case SSL3_ST_SW_HELLO_REQ_B: | 270 | case SSL3_ST_SW_HELLO_REQ_B: |
273 | |||
274 | s->internal->shutdown = 0; | 271 | s->internal->shutdown = 0; |
275 | ret = ssl3_send_hello_request(s); | 272 | ret = ssl3_send_hello_request(s); |
276 | if (ret <= 0) | 273 | if (ret <= 0) |
@@ -292,7 +289,6 @@ ssl3_accept(SSL *s) | |||
292 | case SSL3_ST_SR_CLNT_HELLO_A: | 289 | case SSL3_ST_SR_CLNT_HELLO_A: |
293 | case SSL3_ST_SR_CLNT_HELLO_B: | 290 | case SSL3_ST_SR_CLNT_HELLO_B: |
294 | case SSL3_ST_SR_CLNT_HELLO_C: | 291 | case SSL3_ST_SR_CLNT_HELLO_C: |
295 | |||
296 | s->internal->shutdown = 0; | 292 | s->internal->shutdown = 0; |
297 | if (s->internal->rwstate != SSL_X509_LOOKUP) { | 293 | if (s->internal->rwstate != SSL_X509_LOOKUP) { |
298 | ret = ssl3_get_client_hello(s); | 294 | ret = ssl3_get_client_hello(s); |
@@ -315,9 +311,9 @@ ssl3_accept(SSL *s) | |||
315 | S3I(s)->hs.state = SSL3_ST_SW_SESSION_TICKET_A; | 311 | S3I(s)->hs.state = SSL3_ST_SW_SESSION_TICKET_A; |
316 | else | 312 | else |
317 | S3I(s)->hs.state = SSL3_ST_SW_CHANGE_A; | 313 | S3I(s)->hs.state = SSL3_ST_SW_CHANGE_A; |
318 | } | 314 | } else { |
319 | else | ||
320 | S3I(s)->hs.state = SSL3_ST_SW_CERT_A; | 315 | S3I(s)->hs.state = SSL3_ST_SW_CERT_A; |
316 | } | ||
321 | s->internal->init_num = 0; | 317 | s->internal->init_num = 0; |
322 | break; | 318 | break; |
323 | 319 | ||
@@ -388,7 +384,7 @@ ssl3_accept(SSL *s) | |||
388 | ((S3I(s)->hs.new_cipher->algorithm_auth & | 384 | ((S3I(s)->hs.new_cipher->algorithm_auth & |
389 | SSL_aNULL) && !(s->verify_mode & | 385 | SSL_aNULL) && !(s->verify_mode & |
390 | SSL_VERIFY_FAIL_IF_NO_PEER_CERT))) { | 386 | SSL_VERIFY_FAIL_IF_NO_PEER_CERT))) { |
391 | /* No cert request */ | 387 | /* No cert request. */ |
392 | skip = 1; | 388 | skip = 1; |
393 | S3I(s)->tmp.cert_request = 0; | 389 | S3I(s)->tmp.cert_request = 0; |
394 | S3I(s)->hs.state = SSL3_ST_SW_SRVR_DONE_A; | 390 | S3I(s)->hs.state = SSL3_ST_SW_SRVR_DONE_A; |
@@ -419,7 +415,6 @@ ssl3_accept(SSL *s) | |||
419 | break; | 415 | break; |
420 | 416 | ||
421 | case SSL3_ST_SW_FLUSH: | 417 | case SSL3_ST_SW_FLUSH: |
422 | |||
423 | /* | 418 | /* |
424 | * This code originally checked to see if | 419 | * This code originally checked to see if |
425 | * any data was pending using BIO_CTRL_INFO | 420 | * any data was pending using BIO_CTRL_INFO |
@@ -430,14 +425,12 @@ ssl3_accept(SSL *s) | |||
430 | * still exist. So instead we just flush | 425 | * still exist. So instead we just flush |
431 | * unconditionally. | 426 | * unconditionally. |
432 | */ | 427 | */ |
433 | |||
434 | s->internal->rwstate = SSL_WRITING; | 428 | s->internal->rwstate = SSL_WRITING; |
435 | if (BIO_flush(s->wbio) <= 0) { | 429 | if (BIO_flush(s->wbio) <= 0) { |
436 | ret = -1; | 430 | ret = -1; |
437 | goto end; | 431 | goto end; |
438 | } | 432 | } |
439 | s->internal->rwstate = SSL_NOTHING; | 433 | s->internal->rwstate = SSL_NOTHING; |
440 | |||
441 | S3I(s)->hs.state = S3I(s)->hs.next_state; | 434 | S3I(s)->hs.state = S3I(s)->hs.next_state; |
442 | break; | 435 | break; |
443 | 436 | ||
@@ -507,7 +500,7 @@ ssl3_accept(SSL *s) | |||
507 | S3I(s)->tmp.cert_verify_md, | 500 | S3I(s)->tmp.cert_verify_md, |
508 | sizeof(S3I(s)->tmp.cert_verify_md), | 501 | sizeof(S3I(s)->tmp.cert_verify_md), |
509 | NULL)) { | 502 | NULL)) { |
510 | ret = -1; | 503 | ret = -1; |
511 | goto end; | 504 | goto end; |
512 | } | 505 | } |
513 | } | 506 | } |
@@ -521,7 +514,6 @@ ssl3_accept(SSL *s) | |||
521 | ret = ssl3_get_cert_verify(s); | 514 | ret = ssl3_get_cert_verify(s); |
522 | if (ret <= 0) | 515 | if (ret <= 0) |
523 | goto end; | 516 | goto end; |
524 | |||
525 | S3I(s)->hs.state = SSL3_ST_SR_FINISHED_A; | 517 | S3I(s)->hs.state = SSL3_ST_SR_FINISHED_A; |
526 | s->internal->init_num = 0; | 518 | s->internal->init_num = 0; |
527 | break; | 519 | break; |
@@ -560,10 +552,8 @@ ssl3_accept(SSL *s) | |||
560 | s->internal->init_num = 0; | 552 | s->internal->init_num = 0; |
561 | break; | 553 | break; |
562 | 554 | ||
563 | |||
564 | case SSL3_ST_SW_CHANGE_A: | 555 | case SSL3_ST_SW_CHANGE_A: |
565 | case SSL3_ST_SW_CHANGE_B: | 556 | case SSL3_ST_SW_CHANGE_B: |
566 | |||
567 | s->session->cipher = S3I(s)->hs.new_cipher; | 557 | s->session->cipher = S3I(s)->hs.new_cipher; |
568 | if (!tls1_setup_key_block(s)) { | 558 | if (!tls1_setup_key_block(s)) { |
569 | ret = -1; | 559 | ret = -1; |
@@ -572,14 +562,13 @@ ssl3_accept(SSL *s) | |||
572 | 562 | ||
573 | ret = ssl3_send_change_cipher_spec(s, | 563 | ret = ssl3_send_change_cipher_spec(s, |
574 | SSL3_ST_SW_CHANGE_A, SSL3_ST_SW_CHANGE_B); | 564 | SSL3_ST_SW_CHANGE_A, SSL3_ST_SW_CHANGE_B); |
575 | |||
576 | if (ret <= 0) | 565 | if (ret <= 0) |
577 | goto end; | 566 | goto end; |
578 | S3I(s)->hs.state = SSL3_ST_SW_FINISHED_A; | 567 | S3I(s)->hs.state = SSL3_ST_SW_FINISHED_A; |
579 | s->internal->init_num = 0; | 568 | s->internal->init_num = 0; |
580 | 569 | ||
581 | if (!tls1_change_cipher_state( | 570 | if (!tls1_change_cipher_state(s, |
582 | s, SSL3_CHANGE_CIPHER_SERVER_WRITE)) { | 571 | SSL3_CHANGE_CIPHER_SERVER_WRITE)) { |
583 | ret = -1; | 572 | ret = -1; |
584 | goto end; | 573 | goto end; |
585 | } | 574 | } |
@@ -589,9 +578,9 @@ ssl3_accept(SSL *s) | |||
589 | case SSL3_ST_SW_FINISHED_A: | 578 | case SSL3_ST_SW_FINISHED_A: |
590 | case SSL3_ST_SW_FINISHED_B: | 579 | case SSL3_ST_SW_FINISHED_B: |
591 | ret = ssl3_send_finished(s, | 580 | ret = ssl3_send_finished(s, |
592 | SSL3_ST_SW_FINISHED_A, SSL3_ST_SW_FINISHED_B, | 581 | SSL3_ST_SW_FINISHED_A, SSL3_ST_SW_FINISHED_B, |
593 | TLS_MD_SERVER_FINISH_CONST, | 582 | TLS_MD_SERVER_FINISH_CONST, |
594 | TLS_MD_SERVER_FINISH_CONST_SIZE); | 583 | TLS_MD_SERVER_FINISH_CONST_SIZE); |
595 | if (ret <= 0) | 584 | if (ret <= 0) |
596 | goto end; | 585 | goto end; |
597 | S3I(s)->hs.state = SSL3_ST_SW_FLUSH; | 586 | S3I(s)->hs.state = SSL3_ST_SW_FLUSH; |
@@ -614,7 +603,7 @@ ssl3_accept(SSL *s) | |||
614 | 603 | ||
615 | s->internal->init_num = 0; | 604 | s->internal->init_num = 0; |
616 | 605 | ||
617 | /* skipped if we just sent a HelloRequest */ | 606 | /* Skipped if we just sent a HelloRequest. */ |
618 | if (s->internal->renegotiate == 2) { | 607 | if (s->internal->renegotiate == 2) { |
619 | s->internal->renegotiate = 0; | 608 | s->internal->renegotiate = 0; |
620 | s->internal->new_session = 0; | 609 | s->internal->new_session = 0; |
@@ -658,10 +647,10 @@ ssl3_accept(SSL *s) | |||
658 | } | 647 | } |
659 | end: | 648 | end: |
660 | /* BIO_flush(s->wbio); */ | 649 | /* BIO_flush(s->wbio); */ |
661 | |||
662 | s->internal->in_handshake--; | 650 | s->internal->in_handshake--; |
663 | if (cb != NULL) | 651 | if (cb != NULL) |
664 | cb(s, SSL_CB_ACCEPT_EXIT, ret); | 652 | cb(s, SSL_CB_ACCEPT_EXIT, ret); |
653 | |||
665 | return (ret); | 654 | return (ret); |
666 | } | 655 | } |
667 | 656 | ||