summaryrefslogtreecommitdiff
path: root/src/lib
diff options
context:
space:
mode:
authortb <>2020-09-01 05:58:35 +0000
committertb <>2020-09-01 05:58:35 +0000
commitd74e0e8fb964cf8f0841796c511fab537ce48110 (patch)
tree3731e86a6e8aedc2d8e23fce01ea4682d72bb74c /src/lib
parent11277d790262bfb3e147758afd8e7cfec21cafe0 (diff)
downloadopenbsd-d74e0e8fb964cf8f0841796c511fab537ce48110.tar.gz
openbsd-d74e0e8fb964cf8f0841796c511fab537ce48110.tar.bz2
openbsd-d74e0e8fb964cf8f0841796c511fab537ce48110.zip
Rename the session pointer ret to sess
ret is a confusing name for a pointer in a function that returns int. ret is only returned in the sense that it ultimately replaces the current s->session on success.
Diffstat (limited to 'src/lib')
-rw-r--r--src/lib/libssl/ssl_sess.c50
1 files changed, 25 insertions, 25 deletions
diff --git a/src/lib/libssl/ssl_sess.c b/src/lib/libssl/ssl_sess.c
index 9e8edd93e8..601a851860 100644
--- a/src/lib/libssl/ssl_sess.c
+++ b/src/lib/libssl/ssl_sess.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_sess.c,v 1.87 2020/08/31 14:34:01 tb Exp $ */ 1/* $OpenBSD: ssl_sess.c,v 1.88 2020/09/01 05:58:35 tb Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -437,7 +437,7 @@ sess_id_done:
437int 437int
438ssl_get_prev_session(SSL *s, CBS *session_id, CBS *ext_block, int *alert) 438ssl_get_prev_session(SSL *s, CBS *session_id, CBS *ext_block, int *alert)
439{ 439{
440 SSL_SESSION *ret = NULL; 440 SSL_SESSION *sess = NULL;
441 int alert_desc = SSL_AD_INTERNAL_ERROR, fatal = 0; 441 int alert_desc = SSL_AD_INTERNAL_ERROR, fatal = 0;
442 int try_session_cache = 1; 442 int try_session_cache = 1;
443 443
@@ -450,7 +450,7 @@ ssl_get_prev_session(SSL *s, CBS *session_id, CBS *ext_block, int *alert)
450 try_session_cache = 0; 450 try_session_cache = 0;
451 451
452 /* Sets s->internal->tlsext_ticket_expected. */ 452 /* Sets s->internal->tlsext_ticket_expected. */
453 switch (tls1_process_ticket(s, session_id, ext_block, &alert_desc, &ret)) { 453 switch (tls1_process_ticket(s, session_id, ext_block, &alert_desc, &sess)) {
454 case TLS1_TICKET_FATAL_ERROR: 454 case TLS1_TICKET_FATAL_ERROR:
455 fatal = 1; 455 fatal = 1;
456 goto err; 456 goto err;
@@ -467,7 +467,7 @@ ssl_get_prev_session(SSL *s, CBS *session_id, CBS *ext_block, int *alert)
467 goto err; 467 goto err;
468 } 468 }
469 469
470 if (try_session_cache && ret == NULL && 470 if (try_session_cache && sess == NULL &&
471 !(s->session_ctx->internal->session_cache_mode & 471 !(s->session_ctx->internal->session_cache_mode &
472 SSL_SESS_CACHE_NO_INTERNAL_LOOKUP)) { 472 SSL_SESS_CACHE_NO_INTERNAL_LOOKUP)) {
473 SSL_SESSION data; 473 SSL_SESSION data;
@@ -478,23 +478,23 @@ ssl_get_prev_session(SSL *s, CBS *session_id, CBS *ext_block, int *alert)
478 CBS_len(session_id)); 478 CBS_len(session_id));
479 479
480 CRYPTO_r_lock(CRYPTO_LOCK_SSL_CTX); 480 CRYPTO_r_lock(CRYPTO_LOCK_SSL_CTX);
481 ret = lh_SSL_SESSION_retrieve(s->session_ctx->internal->sessions, &data); 481 sess = lh_SSL_SESSION_retrieve(s->session_ctx->internal->sessions, &data);
482 if (ret != NULL) { 482 if (sess != NULL) {
483 /* Don't allow other threads to steal it. */ 483 /* Don't allow other threads to steal it. */
484 CRYPTO_add(&ret->references, 1, 484 CRYPTO_add(&sess->references, 1,
485 CRYPTO_LOCK_SSL_SESSION); 485 CRYPTO_LOCK_SSL_SESSION);
486 } 486 }
487 CRYPTO_r_unlock(CRYPTO_LOCK_SSL_CTX); 487 CRYPTO_r_unlock(CRYPTO_LOCK_SSL_CTX);
488 488
489 if (ret == NULL) 489 if (sess == NULL)
490 s->session_ctx->internal->stats.sess_miss++; 490 s->session_ctx->internal->stats.sess_miss++;
491 } 491 }
492 492
493 if (try_session_cache && ret == NULL && 493 if (try_session_cache && sess == NULL &&
494 s->session_ctx->internal->get_session_cb != NULL) { 494 s->session_ctx->internal->get_session_cb != NULL) {
495 int copy = 1; 495 int copy = 1;
496 496
497 if ((ret = s->session_ctx->internal->get_session_cb(s, 497 if ((sess = s->session_ctx->internal->get_session_cb(s,
498 CBS_data(session_id), CBS_len(session_id), &copy))) { 498 CBS_data(session_id), CBS_len(session_id), &copy))) {
499 s->session_ctx->internal->stats.sess_cb_hit++; 499 s->session_ctx->internal->stats.sess_cb_hit++;
500 500
@@ -507,7 +507,7 @@ ssl_get_prev_session(SSL *s, CBS *session_id, CBS *ext_block, int *alert)
507 * thread-safe). 507 * thread-safe).
508 */ 508 */
509 if (copy) 509 if (copy)
510 CRYPTO_add(&ret->references, 1, 510 CRYPTO_add(&sess->references, 1,
511 CRYPTO_LOCK_SSL_SESSION); 511 CRYPTO_LOCK_SSL_SESSION);
512 512
513 /* 513 /*
@@ -520,18 +520,18 @@ ssl_get_prev_session(SSL *s, CBS *session_id, CBS *ext_block, int *alert)
520 * The following should not return 1, 520 * The following should not return 1,
521 * otherwise, things are very strange. 521 * otherwise, things are very strange.
522 */ 522 */
523 SSL_CTX_add_session(s->session_ctx, ret); 523 SSL_CTX_add_session(s->session_ctx, sess);
524 } 524 }
525 } 525 }
526 526
527 if (ret == NULL) 527 if (sess == NULL)
528 goto err; 528 goto err;
529 529
530 /* Now ret is non-NULL and we own one of its reference counts. */ 530 /* Now sess is non-NULL and we own one of its reference counts. */
531 531
532 if (ret->sid_ctx_length != s->sid_ctx_length || 532 if (sess->sid_ctx_length != s->sid_ctx_length ||
533 timingsafe_memcmp(ret->sid_ctx, 533 timingsafe_memcmp(sess->sid_ctx,
534 s->sid_ctx, ret->sid_ctx_length) != 0) { 534 s->sid_ctx, sess->sid_ctx_length) != 0) {
535 /* We have the session requested by the client, but we don't 535 /* We have the session requested by the client, but we don't
536 * want to use it in this context. */ 536 * want to use it in this context. */
537 goto err; /* treat like cache miss */ 537 goto err; /* treat like cache miss */
@@ -554,18 +554,18 @@ ssl_get_prev_session(SSL *s, CBS *session_id, CBS *ext_block, int *alert)
554 goto err; 554 goto err;
555 } 555 }
556 556
557 if (ret->cipher == NULL) { 557 if (sess->cipher == NULL) {
558 ret->cipher = ssl3_get_cipher_by_id(ret->cipher_id); 558 sess->cipher = ssl3_get_cipher_by_id(sess->cipher_id);
559 if (ret->cipher == NULL) 559 if (sess->cipher == NULL)
560 goto err; 560 goto err;
561 } 561 }
562 562
563 if (ret->timeout < (time(NULL) - ret->time)) { 563 if (sess->timeout < (time(NULL) - sess->time)) {
564 /* timeout */ 564 /* timeout */
565 s->session_ctx->internal->stats.sess_timeout++; 565 s->session_ctx->internal->stats.sess_timeout++;
566 if (try_session_cache) { 566 if (try_session_cache) {
567 /* session was from the cache, so remove it */ 567 /* session was from the cache, so remove it */
568 SSL_CTX_remove_session(s->session_ctx, ret); 568 SSL_CTX_remove_session(s->session_ctx, sess);
569 } 569 }
570 goto err; 570 goto err;
571 } 571 }
@@ -574,13 +574,13 @@ ssl_get_prev_session(SSL *s, CBS *session_id, CBS *ext_block, int *alert)
574 574
575 if (s->session != NULL) 575 if (s->session != NULL)
576 SSL_SESSION_free(s->session); 576 SSL_SESSION_free(s->session);
577 s->session = ret; 577 s->session = sess;
578 s->verify_result = s->session->verify_result; 578 s->verify_result = s->session->verify_result;
579 return 1; 579 return 1;
580 580
581err: 581err:
582 if (ret != NULL) { 582 if (sess != NULL) {
583 SSL_SESSION_free(ret); 583 SSL_SESSION_free(sess);
584 if (!try_session_cache) { 584 if (!try_session_cache) {
585 /* 585 /*
586 * The session was from a ticket, so we should 586 * The session was from a ticket, so we should