summaryrefslogtreecommitdiff
path: root/src/lib
diff options
context:
space:
mode:
authorjsing <>2017-10-08 16:46:31 +0000
committerjsing <>2017-10-08 16:46:31 +0000
commit800c39ad0b8765bdbf6cec4a8f02a9cbbacb1dfe (patch)
tree6db9525c9f1a539b0d0f1630022d17810c1a5d2e /src/lib
parentd2e8ad1f2205caba4255fe49dcc60abcddfa2ae8 (diff)
downloadopenbsd-800c39ad0b8765bdbf6cec4a8f02a9cbbacb1dfe.tar.gz
openbsd-800c39ad0b8765bdbf6cec4a8f02a9cbbacb1dfe.tar.bz2
openbsd-800c39ad0b8765bdbf6cec4a8f02a9cbbacb1dfe.zip
Fix some style/whitespace/indentation issues in ssl3_accept().
Diffstat (limited to 'src/lib')
-rw-r--r--src/lib/libssl/ssl_srvr.c39
1 files changed, 14 insertions, 25 deletions
diff --git a/src/lib/libssl/ssl_srvr.c b/src/lib/libssl/ssl_srvr.c
index c43d63d991..686d8c8db6 100644
--- a/src/lib/libssl/ssl_srvr.c
+++ b/src/lib/libssl/ssl_srvr.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_srvr.c,v 1.22 2017/08/12 21:47:59 jsing Exp $ */ 1/* $OpenBSD: ssl_srvr.c,v 1.23 2017/10/08 16:46:31 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -170,8 +170,8 @@
170int 170int
171ssl3_accept(SSL *s) 171ssl3_accept(SSL *s)
172{ 172{
173 unsigned long alg_k;
174 void (*cb)(const SSL *ssl, int type, int val) = NULL; 173 void (*cb)(const SSL *ssl, int type, int val) = NULL;
174 unsigned long alg_k;
175 int ret = -1; 175 int ret = -1;
176 int new_state, state, skip = 0; 176 int new_state, state, skip = 0;
177 177
@@ -206,7 +206,6 @@ ssl3_accept(SSL *s)
206 case SSL_ST_ACCEPT: 206 case SSL_ST_ACCEPT:
207 case SSL_ST_BEFORE|SSL_ST_ACCEPT: 207 case SSL_ST_BEFORE|SSL_ST_ACCEPT:
208 case SSL_ST_OK|SSL_ST_ACCEPT: 208 case SSL_ST_OK|SSL_ST_ACCEPT:
209
210 s->server = 1; 209 s->server = 1;
211 if (cb != NULL) 210 if (cb != NULL)
212 cb(s, SSL_CB_HANDSHAKE_START, 1); 211 cb(s, SSL_CB_HANDSHAKE_START, 1);
@@ -239,7 +238,6 @@ ssl3_accept(SSL *s)
239 ret = -1; 238 ret = -1;
240 goto end; 239 goto end;
241 } 240 }
242
243 if (!tls1_init_finished_mac(s)) { 241 if (!tls1_init_finished_mac(s)) {
244 ret = -1; 242 ret = -1;
245 goto end; 243 goto end;
@@ -261,7 +259,7 @@ ssl3_accept(SSL *s)
261 } else { 259 } else {
262 /* 260 /*
263 * S3I(s)->hs.state == SSL_ST_RENEGOTIATE, 261 * S3I(s)->hs.state == SSL_ST_RENEGOTIATE,
264 * we will just send a HelloRequest 262 * we will just send a HelloRequest.
265 */ 263 */
266 s->ctx->internal->stats.sess_accept_renegotiate++; 264 s->ctx->internal->stats.sess_accept_renegotiate++;
267 S3I(s)->hs.state = SSL3_ST_SW_HELLO_REQ_A; 265 S3I(s)->hs.state = SSL3_ST_SW_HELLO_REQ_A;
@@ -270,7 +268,6 @@ ssl3_accept(SSL *s)
270 268
271 case SSL3_ST_SW_HELLO_REQ_A: 269 case SSL3_ST_SW_HELLO_REQ_A:
272 case SSL3_ST_SW_HELLO_REQ_B: 270 case SSL3_ST_SW_HELLO_REQ_B:
273
274 s->internal->shutdown = 0; 271 s->internal->shutdown = 0;
275 ret = ssl3_send_hello_request(s); 272 ret = ssl3_send_hello_request(s);
276 if (ret <= 0) 273 if (ret <= 0)
@@ -292,7 +289,6 @@ ssl3_accept(SSL *s)
292 case SSL3_ST_SR_CLNT_HELLO_A: 289 case SSL3_ST_SR_CLNT_HELLO_A:
293 case SSL3_ST_SR_CLNT_HELLO_B: 290 case SSL3_ST_SR_CLNT_HELLO_B:
294 case SSL3_ST_SR_CLNT_HELLO_C: 291 case SSL3_ST_SR_CLNT_HELLO_C:
295
296 s->internal->shutdown = 0; 292 s->internal->shutdown = 0;
297 if (s->internal->rwstate != SSL_X509_LOOKUP) { 293 if (s->internal->rwstate != SSL_X509_LOOKUP) {
298 ret = ssl3_get_client_hello(s); 294 ret = ssl3_get_client_hello(s);
@@ -315,9 +311,9 @@ ssl3_accept(SSL *s)
315 S3I(s)->hs.state = SSL3_ST_SW_SESSION_TICKET_A; 311 S3I(s)->hs.state = SSL3_ST_SW_SESSION_TICKET_A;
316 else 312 else
317 S3I(s)->hs.state = SSL3_ST_SW_CHANGE_A; 313 S3I(s)->hs.state = SSL3_ST_SW_CHANGE_A;
318 } 314 } else {
319 else
320 S3I(s)->hs.state = SSL3_ST_SW_CERT_A; 315 S3I(s)->hs.state = SSL3_ST_SW_CERT_A;
316 }
321 s->internal->init_num = 0; 317 s->internal->init_num = 0;
322 break; 318 break;
323 319
@@ -388,7 +384,7 @@ ssl3_accept(SSL *s)
388 ((S3I(s)->hs.new_cipher->algorithm_auth & 384 ((S3I(s)->hs.new_cipher->algorithm_auth &
389 SSL_aNULL) && !(s->verify_mode & 385 SSL_aNULL) && !(s->verify_mode &
390 SSL_VERIFY_FAIL_IF_NO_PEER_CERT))) { 386 SSL_VERIFY_FAIL_IF_NO_PEER_CERT))) {
391 /* No cert request */ 387 /* No cert request. */
392 skip = 1; 388 skip = 1;
393 S3I(s)->tmp.cert_request = 0; 389 S3I(s)->tmp.cert_request = 0;
394 S3I(s)->hs.state = SSL3_ST_SW_SRVR_DONE_A; 390 S3I(s)->hs.state = SSL3_ST_SW_SRVR_DONE_A;
@@ -419,7 +415,6 @@ ssl3_accept(SSL *s)
419 break; 415 break;
420 416
421 case SSL3_ST_SW_FLUSH: 417 case SSL3_ST_SW_FLUSH:
422
423 /* 418 /*
424 * This code originally checked to see if 419 * This code originally checked to see if
425 * any data was pending using BIO_CTRL_INFO 420 * any data was pending using BIO_CTRL_INFO
@@ -430,14 +425,12 @@ ssl3_accept(SSL *s)
430 * still exist. So instead we just flush 425 * still exist. So instead we just flush
431 * unconditionally. 426 * unconditionally.
432 */ 427 */
433
434 s->internal->rwstate = SSL_WRITING; 428 s->internal->rwstate = SSL_WRITING;
435 if (BIO_flush(s->wbio) <= 0) { 429 if (BIO_flush(s->wbio) <= 0) {
436 ret = -1; 430 ret = -1;
437 goto end; 431 goto end;
438 } 432 }
439 s->internal->rwstate = SSL_NOTHING; 433 s->internal->rwstate = SSL_NOTHING;
440
441 S3I(s)->hs.state = S3I(s)->hs.next_state; 434 S3I(s)->hs.state = S3I(s)->hs.next_state;
442 break; 435 break;
443 436
@@ -507,7 +500,7 @@ ssl3_accept(SSL *s)
507 S3I(s)->tmp.cert_verify_md, 500 S3I(s)->tmp.cert_verify_md,
508 sizeof(S3I(s)->tmp.cert_verify_md), 501 sizeof(S3I(s)->tmp.cert_verify_md),
509 NULL)) { 502 NULL)) {
510 ret = -1; 503 ret = -1;
511 goto end; 504 goto end;
512 } 505 }
513 } 506 }
@@ -521,7 +514,6 @@ ssl3_accept(SSL *s)
521 ret = ssl3_get_cert_verify(s); 514 ret = ssl3_get_cert_verify(s);
522 if (ret <= 0) 515 if (ret <= 0)
523 goto end; 516 goto end;
524
525 S3I(s)->hs.state = SSL3_ST_SR_FINISHED_A; 517 S3I(s)->hs.state = SSL3_ST_SR_FINISHED_A;
526 s->internal->init_num = 0; 518 s->internal->init_num = 0;
527 break; 519 break;
@@ -560,10 +552,8 @@ ssl3_accept(SSL *s)
560 s->internal->init_num = 0; 552 s->internal->init_num = 0;
561 break; 553 break;
562 554
563
564 case SSL3_ST_SW_CHANGE_A: 555 case SSL3_ST_SW_CHANGE_A:
565 case SSL3_ST_SW_CHANGE_B: 556 case SSL3_ST_SW_CHANGE_B:
566
567 s->session->cipher = S3I(s)->hs.new_cipher; 557 s->session->cipher = S3I(s)->hs.new_cipher;
568 if (!tls1_setup_key_block(s)) { 558 if (!tls1_setup_key_block(s)) {
569 ret = -1; 559 ret = -1;
@@ -572,14 +562,13 @@ ssl3_accept(SSL *s)
572 562
573 ret = ssl3_send_change_cipher_spec(s, 563 ret = ssl3_send_change_cipher_spec(s,
574 SSL3_ST_SW_CHANGE_A, SSL3_ST_SW_CHANGE_B); 564 SSL3_ST_SW_CHANGE_A, SSL3_ST_SW_CHANGE_B);
575
576 if (ret <= 0) 565 if (ret <= 0)
577 goto end; 566 goto end;
578 S3I(s)->hs.state = SSL3_ST_SW_FINISHED_A; 567 S3I(s)->hs.state = SSL3_ST_SW_FINISHED_A;
579 s->internal->init_num = 0; 568 s->internal->init_num = 0;
580 569
581 if (!tls1_change_cipher_state( 570 if (!tls1_change_cipher_state(s,
582 s, SSL3_CHANGE_CIPHER_SERVER_WRITE)) { 571 SSL3_CHANGE_CIPHER_SERVER_WRITE)) {
583 ret = -1; 572 ret = -1;
584 goto end; 573 goto end;
585 } 574 }
@@ -589,9 +578,9 @@ ssl3_accept(SSL *s)
589 case SSL3_ST_SW_FINISHED_A: 578 case SSL3_ST_SW_FINISHED_A:
590 case SSL3_ST_SW_FINISHED_B: 579 case SSL3_ST_SW_FINISHED_B:
591 ret = ssl3_send_finished(s, 580 ret = ssl3_send_finished(s,
592 SSL3_ST_SW_FINISHED_A, SSL3_ST_SW_FINISHED_B, 581 SSL3_ST_SW_FINISHED_A, SSL3_ST_SW_FINISHED_B,
593 TLS_MD_SERVER_FINISH_CONST, 582 TLS_MD_SERVER_FINISH_CONST,
594 TLS_MD_SERVER_FINISH_CONST_SIZE); 583 TLS_MD_SERVER_FINISH_CONST_SIZE);
595 if (ret <= 0) 584 if (ret <= 0)
596 goto end; 585 goto end;
597 S3I(s)->hs.state = SSL3_ST_SW_FLUSH; 586 S3I(s)->hs.state = SSL3_ST_SW_FLUSH;
@@ -614,7 +603,7 @@ ssl3_accept(SSL *s)
614 603
615 s->internal->init_num = 0; 604 s->internal->init_num = 0;
616 605
617 /* skipped if we just sent a HelloRequest */ 606 /* Skipped if we just sent a HelloRequest. */
618 if (s->internal->renegotiate == 2) { 607 if (s->internal->renegotiate == 2) {
619 s->internal->renegotiate = 0; 608 s->internal->renegotiate = 0;
620 s->internal->new_session = 0; 609 s->internal->new_session = 0;
@@ -658,10 +647,10 @@ ssl3_accept(SSL *s)
658 } 647 }
659end: 648end:
660 /* BIO_flush(s->wbio); */ 649 /* BIO_flush(s->wbio); */
661
662 s->internal->in_handshake--; 650 s->internal->in_handshake--;
663 if (cb != NULL) 651 if (cb != NULL)
664 cb(s, SSL_CB_ACCEPT_EXIT, ret); 652 cb(s, SSL_CB_ACCEPT_EXIT, ret);
653
665 return (ret); 654 return (ret);
666} 655}
667 656