diff options
| author | jsing <> | 2021-06-11 17:29:48 +0000 |
|---|---|---|
| committer | jsing <> | 2021-06-11 17:29:48 +0000 |
| commit | 25b5c080aa64e34d31477c1bcf914d3ad678bad8 (patch) | |
| tree | 9ed8ed1745db8d4d214ef9607fadbd3644769e1a /src | |
| parent | 2215c5d14fb37cc4aab492e6fdbd91ccb77380f9 (diff) | |
| download | openbsd-25b5c080aa64e34d31477c1bcf914d3ad678bad8.tar.gz openbsd-25b5c080aa64e34d31477c1bcf914d3ad678bad8.tar.bz2 openbsd-25b5c080aa64e34d31477c1bcf914d3ad678bad8.zip | |
Only use SSL_AD_* internally.
Due to hysterical raisins there are three different types of defines for
alerts. SSL3_AD_* are from SSLv3, TLS1_AD_* are from TLSv1.0 onwards and
SSL_AD_* currently map to either an SSL3_AD_* or TLS1_AD_* define.
Currently, all three of these are used in various places - switch to using
just SSL_AD_* values internally, as a first step in cleaning this up.
ok tb@
Diffstat (limited to 'src')
| -rw-r--r-- | src/lib/libssl/d1_both.c | 4 | ||||
| -rw-r--r-- | src/lib/libssl/ssl_stat.c | 122 | ||||
| -rw-r--r-- | src/lib/libssl/ssl_tlsext.c | 50 |
3 files changed, 88 insertions, 88 deletions
diff --git a/src/lib/libssl/d1_both.c b/src/lib/libssl/d1_both.c index 8e734f1277..52189128c8 100644 --- a/src/lib/libssl/d1_both.c +++ b/src/lib/libssl/d1_both.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: d1_both.c,v 1.74 2021/06/11 11:29:44 jsing Exp $ */ | 1 | /* $OpenBSD: d1_both.c,v 1.75 2021/06/11 17:29:48 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * DTLS implementation written by Nagendra Modadugu | 3 | * DTLS implementation written by Nagendra Modadugu |
| 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. | 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. |
| @@ -841,7 +841,7 @@ dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, int *ok) | |||
| 841 | * handshake to fail | 841 | * handshake to fail |
| 842 | */ | 842 | */ |
| 843 | if (i != (int)frag_len) { | 843 | if (i != (int)frag_len) { |
| 844 | al = SSL3_AD_ILLEGAL_PARAMETER; | 844 | al = SSL_AD_ILLEGAL_PARAMETER; |
| 845 | SSLerror(s, SSL_R_SSLV3_ALERT_ILLEGAL_PARAMETER); | 845 | SSLerror(s, SSL_R_SSLV3_ALERT_ILLEGAL_PARAMETER); |
| 846 | goto fatal_err; | 846 | goto fatal_err; |
| 847 | } | 847 | } |
diff --git a/src/lib/libssl/ssl_stat.c b/src/lib/libssl/ssl_stat.c index 6b26d4c915..b813ac6896 100644 --- a/src/lib/libssl/ssl_stat.c +++ b/src/lib/libssl/ssl_stat.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_stat.c,v 1.14 2017/05/07 04:22:24 beck Exp $ */ | 1 | /* $OpenBSD: ssl_stat.c,v 1.15 2021/06/11 17:29:48 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -578,94 +578,94 @@ SSL_alert_desc_string(int value) | |||
| 578 | const char *str; | 578 | const char *str; |
| 579 | 579 | ||
| 580 | switch (value & 0xff) { | 580 | switch (value & 0xff) { |
| 581 | case SSL3_AD_CLOSE_NOTIFY: | 581 | case SSL_AD_CLOSE_NOTIFY: |
| 582 | str = "CN"; | 582 | str = "CN"; |
| 583 | break; | 583 | break; |
| 584 | case SSL3_AD_UNEXPECTED_MESSAGE: | 584 | case SSL_AD_UNEXPECTED_MESSAGE: |
| 585 | str = "UM"; | 585 | str = "UM"; |
| 586 | break; | 586 | break; |
| 587 | case SSL3_AD_BAD_RECORD_MAC: | 587 | case SSL_AD_BAD_RECORD_MAC: |
| 588 | str = "BM"; | 588 | str = "BM"; |
| 589 | break; | 589 | break; |
| 590 | case SSL3_AD_DECOMPRESSION_FAILURE: | 590 | case SSL_AD_DECOMPRESSION_FAILURE: |
| 591 | str = "DF"; | 591 | str = "DF"; |
| 592 | break; | 592 | break; |
| 593 | case SSL3_AD_HANDSHAKE_FAILURE: | 593 | case SSL_AD_HANDSHAKE_FAILURE: |
| 594 | str = "HF"; | 594 | str = "HF"; |
| 595 | break; | 595 | break; |
| 596 | case SSL3_AD_NO_CERTIFICATE: | 596 | case SSL_AD_NO_CERTIFICATE: |
| 597 | str = "NC"; | 597 | str = "NC"; |
| 598 | break; | 598 | break; |
| 599 | case SSL3_AD_BAD_CERTIFICATE: | 599 | case SSL_AD_BAD_CERTIFICATE: |
| 600 | str = "BC"; | 600 | str = "BC"; |
| 601 | break; | 601 | break; |
| 602 | case SSL3_AD_UNSUPPORTED_CERTIFICATE: | 602 | case SSL_AD_UNSUPPORTED_CERTIFICATE: |
| 603 | str = "UC"; | 603 | str = "UC"; |
| 604 | break; | 604 | break; |
| 605 | case SSL3_AD_CERTIFICATE_REVOKED: | 605 | case SSL_AD_CERTIFICATE_REVOKED: |
| 606 | str = "CR"; | 606 | str = "CR"; |
| 607 | break; | 607 | break; |
| 608 | case SSL3_AD_CERTIFICATE_EXPIRED: | 608 | case SSL_AD_CERTIFICATE_EXPIRED: |
| 609 | str = "CE"; | 609 | str = "CE"; |
| 610 | break; | 610 | break; |
| 611 | case SSL3_AD_CERTIFICATE_UNKNOWN: | 611 | case SSL_AD_CERTIFICATE_UNKNOWN: |
| 612 | str = "CU"; | 612 | str = "CU"; |
| 613 | break; | 613 | break; |
| 614 | case SSL3_AD_ILLEGAL_PARAMETER: | 614 | case SSL_AD_ILLEGAL_PARAMETER: |
| 615 | str = "IP"; | 615 | str = "IP"; |
| 616 | break; | 616 | break; |
| 617 | case TLS1_AD_DECRYPTION_FAILED: | 617 | case SSL_AD_DECRYPTION_FAILED: |
| 618 | str = "DC"; | 618 | str = "DC"; |
| 619 | break; | 619 | break; |
| 620 | case TLS1_AD_RECORD_OVERFLOW: | 620 | case SSL_AD_RECORD_OVERFLOW: |
| 621 | str = "RO"; | 621 | str = "RO"; |
| 622 | break; | 622 | break; |
| 623 | case TLS1_AD_UNKNOWN_CA: | 623 | case SSL_AD_UNKNOWN_CA: |
| 624 | str = "CA"; | 624 | str = "CA"; |
| 625 | break; | 625 | break; |
| 626 | case TLS1_AD_ACCESS_DENIED: | 626 | case SSL_AD_ACCESS_DENIED: |
| 627 | str = "AD"; | 627 | str = "AD"; |
| 628 | break; | 628 | break; |
| 629 | case TLS1_AD_DECODE_ERROR: | 629 | case SSL_AD_DECODE_ERROR: |
| 630 | str = "DE"; | 630 | str = "DE"; |
| 631 | break; | 631 | break; |
| 632 | case TLS1_AD_DECRYPT_ERROR: | 632 | case SSL_AD_DECRYPT_ERROR: |
| 633 | str = "CY"; | 633 | str = "CY"; |
| 634 | break; | 634 | break; |
| 635 | case TLS1_AD_EXPORT_RESTRICTION: | 635 | case SSL_AD_EXPORT_RESTRICTION: |
| 636 | str = "ER"; | 636 | str = "ER"; |
| 637 | break; | 637 | break; |
| 638 | case TLS1_AD_PROTOCOL_VERSION: | 638 | case SSL_AD_PROTOCOL_VERSION: |
| 639 | str = "PV"; | 639 | str = "PV"; |
| 640 | break; | 640 | break; |
| 641 | case TLS1_AD_INSUFFICIENT_SECURITY: | 641 | case SSL_AD_INSUFFICIENT_SECURITY: |
| 642 | str = "IS"; | 642 | str = "IS"; |
| 643 | break; | 643 | break; |
| 644 | case TLS1_AD_INTERNAL_ERROR: | 644 | case SSL_AD_INTERNAL_ERROR: |
| 645 | str = "IE"; | 645 | str = "IE"; |
| 646 | break; | 646 | break; |
| 647 | case TLS1_AD_USER_CANCELLED: | 647 | case SSL_AD_USER_CANCELLED: |
| 648 | str = "US"; | 648 | str = "US"; |
| 649 | break; | 649 | break; |
| 650 | case TLS1_AD_NO_RENEGOTIATION: | 650 | case SSL_AD_NO_RENEGOTIATION: |
| 651 | str = "NR"; | 651 | str = "NR"; |
| 652 | break; | 652 | break; |
| 653 | case TLS1_AD_UNSUPPORTED_EXTENSION: | 653 | case SSL_AD_UNSUPPORTED_EXTENSION: |
| 654 | str = "UE"; | 654 | str = "UE"; |
| 655 | break; | 655 | break; |
| 656 | case TLS1_AD_CERTIFICATE_UNOBTAINABLE: | 656 | case SSL_AD_CERTIFICATE_UNOBTAINABLE: |
| 657 | str = "CO"; | 657 | str = "CO"; |
| 658 | break; | 658 | break; |
| 659 | case TLS1_AD_UNRECOGNIZED_NAME: | 659 | case SSL_AD_UNRECOGNIZED_NAME: |
| 660 | str = "UN"; | 660 | str = "UN"; |
| 661 | break; | 661 | break; |
| 662 | case TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE: | 662 | case SSL_AD_BAD_CERTIFICATE_STATUS_RESPONSE: |
| 663 | str = "BR"; | 663 | str = "BR"; |
| 664 | break; | 664 | break; |
| 665 | case TLS1_AD_BAD_CERTIFICATE_HASH_VALUE: | 665 | case SSL_AD_BAD_CERTIFICATE_HASH_VALUE: |
| 666 | str = "BH"; | 666 | str = "BH"; |
| 667 | break; | 667 | break; |
| 668 | case TLS1_AD_UNKNOWN_PSK_IDENTITY: | 668 | case SSL_AD_UNKNOWN_PSK_IDENTITY: |
| 669 | str = "UP"; | 669 | str = "UP"; |
| 670 | break; | 670 | break; |
| 671 | default: | 671 | default: |
| @@ -681,94 +681,94 @@ SSL_alert_desc_string_long(int value) | |||
| 681 | const char *str; | 681 | const char *str; |
| 682 | 682 | ||
| 683 | switch (value & 0xff) { | 683 | switch (value & 0xff) { |
| 684 | case SSL3_AD_CLOSE_NOTIFY: | 684 | case SSL_AD_CLOSE_NOTIFY: |
| 685 | str = "close notify"; | 685 | str = "close notify"; |
| 686 | break; | 686 | break; |
| 687 | case SSL3_AD_UNEXPECTED_MESSAGE: | 687 | case SSL_AD_UNEXPECTED_MESSAGE: |
| 688 | str = "unexpected_message"; | 688 | str = "unexpected_message"; |
| 689 | break; | 689 | break; |
| 690 | case SSL3_AD_BAD_RECORD_MAC: | 690 | case SSL_AD_BAD_RECORD_MAC: |
| 691 | str = "bad record mac"; | 691 | str = "bad record mac"; |
| 692 | break; | 692 | break; |
| 693 | case SSL3_AD_DECOMPRESSION_FAILURE: | 693 | case SSL_AD_DECOMPRESSION_FAILURE: |
| 694 | str = "decompression failure"; | 694 | str = "decompression failure"; |
| 695 | break; | 695 | break; |
| 696 | case SSL3_AD_HANDSHAKE_FAILURE: | 696 | case SSL_AD_HANDSHAKE_FAILURE: |
| 697 | str = "handshake failure"; | 697 | str = "handshake failure"; |
| 698 | break; | 698 | break; |
| 699 | case SSL3_AD_NO_CERTIFICATE: | 699 | case SSL_AD_NO_CERTIFICATE: |
| 700 | str = "no certificate"; | 700 | str = "no certificate"; |
| 701 | break; | 701 | break; |
| 702 | case SSL3_AD_BAD_CERTIFICATE: | 702 | case SSL_AD_BAD_CERTIFICATE: |
| 703 | str = "bad certificate"; | 703 | str = "bad certificate"; |
| 704 | break; | 704 | break; |
| 705 | case SSL3_AD_UNSUPPORTED_CERTIFICATE: | 705 | case SSL_AD_UNSUPPORTED_CERTIFICATE: |
| 706 | str = "unsupported certificate"; | 706 | str = "unsupported certificate"; |
| 707 | break; | 707 | break; |
| 708 | case SSL3_AD_CERTIFICATE_REVOKED: | 708 | case SSL_AD_CERTIFICATE_REVOKED: |
| 709 | str = "certificate revoked"; | 709 | str = "certificate revoked"; |
| 710 | break; | 710 | break; |
| 711 | case SSL3_AD_CERTIFICATE_EXPIRED: | 711 | case SSL_AD_CERTIFICATE_EXPIRED: |
| 712 | str = "certificate expired"; | 712 | str = "certificate expired"; |
| 713 | break; | 713 | break; |
| 714 | case SSL3_AD_CERTIFICATE_UNKNOWN: | 714 | case SSL_AD_CERTIFICATE_UNKNOWN: |
| 715 | str = "certificate unknown"; | 715 | str = "certificate unknown"; |
| 716 | break; | 716 | break; |
| 717 | case SSL3_AD_ILLEGAL_PARAMETER: | 717 | case SSL_AD_ILLEGAL_PARAMETER: |
| 718 | str = "illegal parameter"; | 718 | str = "illegal parameter"; |
| 719 | break; | 719 | break; |
| 720 | case TLS1_AD_DECRYPTION_FAILED: | 720 | case SSL_AD_DECRYPTION_FAILED: |
| 721 | str = "decryption failed"; | 721 | str = "decryption failed"; |
| 722 | break; | 722 | break; |
| 723 | case TLS1_AD_RECORD_OVERFLOW: | 723 | case SSL_AD_RECORD_OVERFLOW: |
| 724 | str = "record overflow"; | 724 | str = "record overflow"; |
| 725 | break; | 725 | break; |
| 726 | case TLS1_AD_UNKNOWN_CA: | 726 | case SSL_AD_UNKNOWN_CA: |
| 727 | str = "unknown CA"; | 727 | str = "unknown CA"; |
| 728 | break; | 728 | break; |
| 729 | case TLS1_AD_ACCESS_DENIED: | 729 | case SSL_AD_ACCESS_DENIED: |
| 730 | str = "access denied"; | 730 | str = "access denied"; |
| 731 | break; | 731 | break; |
| 732 | case TLS1_AD_DECODE_ERROR: | 732 | case SSL_AD_DECODE_ERROR: |
| 733 | str = "decode error"; | 733 | str = "decode error"; |
| 734 | break; | 734 | break; |
| 735 | case TLS1_AD_DECRYPT_ERROR: | 735 | case SSL_AD_DECRYPT_ERROR: |
| 736 | str = "decrypt error"; | 736 | str = "decrypt error"; |
| 737 | break; | 737 | break; |
| 738 | case TLS1_AD_EXPORT_RESTRICTION: | 738 | case SSL_AD_EXPORT_RESTRICTION: |
| 739 | str = "export restriction"; | 739 | str = "export restriction"; |
| 740 | break; | 740 | break; |
| 741 | case TLS1_AD_PROTOCOL_VERSION: | 741 | case SSL_AD_PROTOCOL_VERSION: |
| 742 | str = "protocol version"; | 742 | str = "protocol version"; |
| 743 | break; | 743 | break; |
| 744 | case TLS1_AD_INSUFFICIENT_SECURITY: | 744 | case SSL_AD_INSUFFICIENT_SECURITY: |
| 745 | str = "insufficient security"; | 745 | str = "insufficient security"; |
| 746 | break; | 746 | break; |
| 747 | case TLS1_AD_INTERNAL_ERROR: | 747 | case SSL_AD_INTERNAL_ERROR: |
| 748 | str = "internal error"; | 748 | str = "internal error"; |
| 749 | break; | 749 | break; |
| 750 | case TLS1_AD_USER_CANCELLED: | 750 | case SSL_AD_USER_CANCELLED: |
| 751 | str = "user canceled"; | 751 | str = "user canceled"; |
| 752 | break; | 752 | break; |
| 753 | case TLS1_AD_NO_RENEGOTIATION: | 753 | case SSL_AD_NO_RENEGOTIATION: |
| 754 | str = "no renegotiation"; | 754 | str = "no renegotiation"; |
| 755 | break; | 755 | break; |
| 756 | case TLS1_AD_UNSUPPORTED_EXTENSION: | 756 | case SSL_AD_UNSUPPORTED_EXTENSION: |
| 757 | str = "unsupported extension"; | 757 | str = "unsupported extension"; |
| 758 | break; | 758 | break; |
| 759 | case TLS1_AD_CERTIFICATE_UNOBTAINABLE: | 759 | case SSL_AD_CERTIFICATE_UNOBTAINABLE: |
| 760 | str = "certificate unobtainable"; | 760 | str = "certificate unobtainable"; |
| 761 | break; | 761 | break; |
| 762 | case TLS1_AD_UNRECOGNIZED_NAME: | 762 | case SSL_AD_UNRECOGNIZED_NAME: |
| 763 | str = "unrecognized name"; | 763 | str = "unrecognized name"; |
| 764 | break; | 764 | break; |
| 765 | case TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE: | 765 | case SSL_AD_BAD_CERTIFICATE_STATUS_RESPONSE: |
| 766 | str = "bad certificate status response"; | 766 | str = "bad certificate status response"; |
| 767 | break; | 767 | break; |
| 768 | case TLS1_AD_BAD_CERTIFICATE_HASH_VALUE: | 768 | case SSL_AD_BAD_CERTIFICATE_HASH_VALUE: |
| 769 | str = "bad certificate hash value"; | 769 | str = "bad certificate hash value"; |
| 770 | break; | 770 | break; |
| 771 | case TLS1_AD_UNKNOWN_PSK_IDENTITY: | 771 | case SSL_AD_UNKNOWN_PSK_IDENTITY: |
| 772 | str = "unknown PSK identity"; | 772 | str = "unknown PSK identity"; |
| 773 | break; | 773 | break; |
| 774 | default: | 774 | default: |
diff --git a/src/lib/libssl/ssl_tlsext.c b/src/lib/libssl/ssl_tlsext.c index 8cc86d4649..035d6b4564 100644 --- a/src/lib/libssl/ssl_tlsext.c +++ b/src/lib/libssl/ssl_tlsext.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_tlsext.c,v 1.94 2021/06/08 19:34:44 tb Exp $ */ | 1 | /* $OpenBSD: ssl_tlsext.c,v 1.95 2021/06/11 17:29:48 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2016, 2017, 2019 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2016, 2017, 2019 Joel Sing <jsing@openbsd.org> |
| 4 | * Copyright (c) 2017 Doug Hogan <doug@openbsd.org> | 4 | * Copyright (c) 2017 Doug Hogan <doug@openbsd.org> |
| @@ -139,7 +139,7 @@ tlsext_alpn_client_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) | |||
| 139 | CBS list, proto; | 139 | CBS list, proto; |
| 140 | 140 | ||
| 141 | if (s->internal->alpn_client_proto_list == NULL) { | 141 | if (s->internal->alpn_client_proto_list == NULL) { |
| 142 | *alert = TLS1_AD_UNSUPPORTED_EXTENSION; | 142 | *alert = SSL_AD_UNSUPPORTED_EXTENSION; |
| 143 | return 0; | 143 | return 0; |
| 144 | } | 144 | } |
| 145 | 145 | ||
| @@ -163,7 +163,7 @@ tlsext_alpn_client_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) | |||
| 163 | return 1; | 163 | return 1; |
| 164 | 164 | ||
| 165 | err: | 165 | err: |
| 166 | *alert = TLS1_AD_DECODE_ERROR; | 166 | *alert = SSL_AD_DECODE_ERROR; |
| 167 | return 0; | 167 | return 0; |
| 168 | } | 168 | } |
| 169 | 169 | ||
| @@ -258,7 +258,7 @@ tlsext_supportedgroups_server_parse(SSL *s, uint16_t msg_type, CBS *cbs, | |||
| 258 | 258 | ||
| 259 | if ((groups = reallocarray(NULL, groups_len, | 259 | if ((groups = reallocarray(NULL, groups_len, |
| 260 | sizeof(uint16_t))) == NULL) { | 260 | sizeof(uint16_t))) == NULL) { |
| 261 | *alert = TLS1_AD_INTERNAL_ERROR; | 261 | *alert = SSL_AD_INTERNAL_ERROR; |
| 262 | return 0; | 262 | return 0; |
| 263 | } | 263 | } |
| 264 | 264 | ||
| @@ -281,7 +281,7 @@ tlsext_supportedgroups_server_parse(SSL *s, uint16_t msg_type, CBS *cbs, | |||
| 281 | return 1; | 281 | return 1; |
| 282 | 282 | ||
| 283 | err: | 283 | err: |
| 284 | *alert = TLS1_AD_DECODE_ERROR; | 284 | *alert = SSL_AD_DECODE_ERROR; |
| 285 | return 0; | 285 | return 0; |
| 286 | } | 286 | } |
| 287 | 287 | ||
| @@ -313,7 +313,7 @@ tlsext_supportedgroups_client_parse(SSL *s, uint16_t msg_type, CBS *cbs, | |||
| 313 | * https://support.f5.com/csp/article/K37345003 | 313 | * https://support.f5.com/csp/article/K37345003 |
| 314 | */ | 314 | */ |
| 315 | if (!CBS_skip(cbs, CBS_len(cbs))) { | 315 | if (!CBS_skip(cbs, CBS_len(cbs))) { |
| 316 | *alert = TLS1_AD_INTERNAL_ERROR; | 316 | *alert = SSL_AD_INTERNAL_ERROR; |
| 317 | return 0; | 317 | return 0; |
| 318 | } | 318 | } |
| 319 | 319 | ||
| @@ -362,14 +362,14 @@ tlsext_ecpf_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) | |||
| 362 | /* Must contain uncompressed (0) - RFC 8422, section 5.1.2. */ | 362 | /* Must contain uncompressed (0) - RFC 8422, section 5.1.2. */ |
| 363 | if (!CBS_contains_zero_byte(&ecpf)) { | 363 | if (!CBS_contains_zero_byte(&ecpf)) { |
| 364 | SSLerror(s, SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST); | 364 | SSLerror(s, SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST); |
| 365 | *alert = SSL3_AD_ILLEGAL_PARAMETER; | 365 | *alert = SSL_AD_ILLEGAL_PARAMETER; |
| 366 | return 0; | 366 | return 0; |
| 367 | } | 367 | } |
| 368 | 368 | ||
| 369 | if (!s->internal->hit) { | 369 | if (!s->internal->hit) { |
| 370 | if (!CBS_stow(&ecpf, &(SSI(s)->tlsext_ecpointformatlist), | 370 | if (!CBS_stow(&ecpf, &(SSI(s)->tlsext_ecpointformatlist), |
| 371 | &(SSI(s)->tlsext_ecpointformatlist_length))) { | 371 | &(SSI(s)->tlsext_ecpointformatlist_length))) { |
| 372 | *alert = TLS1_AD_INTERNAL_ERROR; | 372 | *alert = SSL_AD_INTERNAL_ERROR; |
| 373 | return 0; | 373 | return 0; |
| 374 | } | 374 | } |
| 375 | } | 375 | } |
| @@ -505,7 +505,7 @@ tlsext_ri_client_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) | |||
| 505 | S3I(s)->previous_server_finished_len != 0) || | 505 | S3I(s)->previous_server_finished_len != 0) || |
| 506 | (S3I(s)->previous_client_finished_len != 0 && | 506 | (S3I(s)->previous_client_finished_len != 0 && |
| 507 | S3I(s)->previous_server_finished_len == 0)) { | 507 | S3I(s)->previous_server_finished_len == 0)) { |
| 508 | *alert = TLS1_AD_INTERNAL_ERROR; | 508 | *alert = SSL_AD_INTERNAL_ERROR; |
| 509 | return 0; | 509 | return 0; |
| 510 | } | 510 | } |
| 511 | 511 | ||
| @@ -737,7 +737,7 @@ tlsext_sni_server_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) | |||
| 737 | * other implementations appear more tolerant. | 737 | * other implementations appear more tolerant. |
| 738 | */ | 738 | */ |
| 739 | if (name_type != TLSEXT_NAMETYPE_host_name) { | 739 | if (name_type != TLSEXT_NAMETYPE_host_name) { |
| 740 | *alert = SSL3_AD_ILLEGAL_PARAMETER; | 740 | *alert = SSL_AD_ILLEGAL_PARAMETER; |
| 741 | goto err; | 741 | goto err; |
| 742 | } | 742 | } |
| 743 | 743 | ||
| @@ -752,25 +752,25 @@ tlsext_sni_server_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) | |||
| 752 | goto err; | 752 | goto err; |
| 753 | 753 | ||
| 754 | if (!tlsext_sni_is_valid_hostname(&host_name)) { | 754 | if (!tlsext_sni_is_valid_hostname(&host_name)) { |
| 755 | *alert = SSL3_AD_ILLEGAL_PARAMETER; | 755 | *alert = SSL_AD_ILLEGAL_PARAMETER; |
| 756 | goto err; | 756 | goto err; |
| 757 | } | 757 | } |
| 758 | 758 | ||
| 759 | if (s->internal->hit || S3I(s)->hs.tls13.hrr) { | 759 | if (s->internal->hit || S3I(s)->hs.tls13.hrr) { |
| 760 | if (s->session->tlsext_hostname == NULL) { | 760 | if (s->session->tlsext_hostname == NULL) { |
| 761 | *alert = TLS1_AD_UNRECOGNIZED_NAME; | 761 | *alert = SSL_AD_UNRECOGNIZED_NAME; |
| 762 | goto err; | 762 | goto err; |
| 763 | } | 763 | } |
| 764 | if (!CBS_mem_equal(&host_name, s->session->tlsext_hostname, | 764 | if (!CBS_mem_equal(&host_name, s->session->tlsext_hostname, |
| 765 | strlen(s->session->tlsext_hostname))) { | 765 | strlen(s->session->tlsext_hostname))) { |
| 766 | *alert = TLS1_AD_UNRECOGNIZED_NAME; | 766 | *alert = SSL_AD_UNRECOGNIZED_NAME; |
| 767 | goto err; | 767 | goto err; |
| 768 | } | 768 | } |
| 769 | } else { | 769 | } else { |
| 770 | if (s->session->tlsext_hostname != NULL) | 770 | if (s->session->tlsext_hostname != NULL) |
| 771 | goto err; | 771 | goto err; |
| 772 | if (!CBS_strdup(&host_name, &s->session->tlsext_hostname)) { | 772 | if (!CBS_strdup(&host_name, &s->session->tlsext_hostname)) { |
| 773 | *alert = TLS1_AD_INTERNAL_ERROR; | 773 | *alert = SSL_AD_INTERNAL_ERROR; |
| 774 | goto err; | 774 | goto err; |
| 775 | } | 775 | } |
| 776 | } | 776 | } |
| @@ -780,7 +780,7 @@ tlsext_sni_server_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) | |||
| 780 | * therefore we allow only one entry. | 780 | * therefore we allow only one entry. |
| 781 | */ | 781 | */ |
| 782 | if (CBS_len(&server_name_list) != 0) { | 782 | if (CBS_len(&server_name_list) != 0) { |
| 783 | *alert = SSL3_AD_ILLEGAL_PARAMETER; | 783 | *alert = SSL_AD_ILLEGAL_PARAMETER; |
| 784 | goto err; | 784 | goto err; |
| 785 | } | 785 | } |
| 786 | if (CBS_len(cbs) != 0) | 786 | if (CBS_len(cbs) != 0) |
| @@ -811,18 +811,18 @@ int | |||
| 811 | tlsext_sni_client_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) | 811 | tlsext_sni_client_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) |
| 812 | { | 812 | { |
| 813 | if (s->tlsext_hostname == NULL || CBS_len(cbs) != 0) { | 813 | if (s->tlsext_hostname == NULL || CBS_len(cbs) != 0) { |
| 814 | *alert = TLS1_AD_UNRECOGNIZED_NAME; | 814 | *alert = SSL_AD_UNRECOGNIZED_NAME; |
| 815 | return 0; | 815 | return 0; |
| 816 | } | 816 | } |
| 817 | 817 | ||
| 818 | if (s->internal->hit) { | 818 | if (s->internal->hit) { |
| 819 | if (s->session->tlsext_hostname == NULL) { | 819 | if (s->session->tlsext_hostname == NULL) { |
| 820 | *alert = TLS1_AD_UNRECOGNIZED_NAME; | 820 | *alert = SSL_AD_UNRECOGNIZED_NAME; |
| 821 | return 0; | 821 | return 0; |
| 822 | } | 822 | } |
| 823 | if (strcmp(s->tlsext_hostname, | 823 | if (strcmp(s->tlsext_hostname, |
| 824 | s->session->tlsext_hostname) != 0) { | 824 | s->session->tlsext_hostname) != 0) { |
| 825 | *alert = TLS1_AD_UNRECOGNIZED_NAME; | 825 | *alert = SSL_AD_UNRECOGNIZED_NAME; |
| 826 | return 0; | 826 | return 0; |
| 827 | } | 827 | } |
| 828 | } else { | 828 | } else { |
| @@ -832,7 +832,7 @@ tlsext_sni_client_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) | |||
| 832 | } | 832 | } |
| 833 | if ((s->session->tlsext_hostname = | 833 | if ((s->session->tlsext_hostname = |
| 834 | strdup(s->tlsext_hostname)) == NULL) { | 834 | strdup(s->tlsext_hostname)) == NULL) { |
| 835 | *alert = TLS1_AD_INTERNAL_ERROR; | 835 | *alert = SSL_AD_INTERNAL_ERROR; |
| 836 | return 0; | 836 | return 0; |
| 837 | } | 837 | } |
| 838 | } | 838 | } |
| @@ -917,7 +917,7 @@ tlsext_ocsp_server_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) | |||
| 917 | s->tlsext_status_type = -1; | 917 | s->tlsext_status_type = -1; |
| 918 | 918 | ||
| 919 | if (!CBS_skip(cbs, CBS_len(cbs))) { | 919 | if (!CBS_skip(cbs, CBS_len(cbs))) { |
| 920 | *alert = TLS1_AD_INTERNAL_ERROR; | 920 | *alert = SSL_AD_INTERNAL_ERROR; |
| 921 | return 0; | 921 | return 0; |
| 922 | } | 922 | } |
| 923 | return 1; | 923 | return 1; |
| @@ -1051,7 +1051,7 @@ tlsext_ocsp_client_parse(SSL *s, uint16_t msg_type, CBS *cbs, int *alert) | |||
| 1051 | } | 1051 | } |
| 1052 | } else { | 1052 | } else { |
| 1053 | if (s->tlsext_status_type == -1) { | 1053 | if (s->tlsext_status_type == -1) { |
| 1054 | *alert = TLS1_AD_UNSUPPORTED_EXTENSION; | 1054 | *alert = SSL_AD_UNSUPPORTED_EXTENSION; |
| 1055 | return 0; | 1055 | return 0; |
| 1056 | } | 1056 | } |
| 1057 | /* Set flag to expect CertificateStatus message */ | 1057 | /* Set flag to expect CertificateStatus message */ |
| @@ -1135,14 +1135,14 @@ tlsext_sessionticket_server_parse(SSL *s, uint16_t msg_type, CBS *cbs, | |||
| 1135 | if (!s->internal->tls_session_ticket_ext_cb(s, CBS_data(cbs), | 1135 | if (!s->internal->tls_session_ticket_ext_cb(s, CBS_data(cbs), |
| 1136 | (int)CBS_len(cbs), | 1136 | (int)CBS_len(cbs), |
| 1137 | s->internal->tls_session_ticket_ext_cb_arg)) { | 1137 | s->internal->tls_session_ticket_ext_cb_arg)) { |
| 1138 | *alert = TLS1_AD_INTERNAL_ERROR; | 1138 | *alert = SSL_AD_INTERNAL_ERROR; |
| 1139 | return 0; | 1139 | return 0; |
| 1140 | } | 1140 | } |
| 1141 | } | 1141 | } |
| 1142 | 1142 | ||
| 1143 | /* We need to signal that this was processed fully */ | 1143 | /* We need to signal that this was processed fully */ |
| 1144 | if (!CBS_skip(cbs, CBS_len(cbs))) { | 1144 | if (!CBS_skip(cbs, CBS_len(cbs))) { |
| 1145 | *alert = TLS1_AD_INTERNAL_ERROR; | 1145 | *alert = SSL_AD_INTERNAL_ERROR; |
| 1146 | return 0; | 1146 | return 0; |
| 1147 | } | 1147 | } |
| 1148 | 1148 | ||
| @@ -1171,13 +1171,13 @@ tlsext_sessionticket_client_parse(SSL *s, uint16_t msg_type, CBS *cbs, | |||
| 1171 | if (!s->internal->tls_session_ticket_ext_cb(s, CBS_data(cbs), | 1171 | if (!s->internal->tls_session_ticket_ext_cb(s, CBS_data(cbs), |
| 1172 | (int)CBS_len(cbs), | 1172 | (int)CBS_len(cbs), |
| 1173 | s->internal->tls_session_ticket_ext_cb_arg)) { | 1173 | s->internal->tls_session_ticket_ext_cb_arg)) { |
| 1174 | *alert = TLS1_AD_INTERNAL_ERROR; | 1174 | *alert = SSL_AD_INTERNAL_ERROR; |
| 1175 | return 0; | 1175 | return 0; |
| 1176 | } | 1176 | } |
| 1177 | } | 1177 | } |
| 1178 | 1178 | ||
| 1179 | if ((SSL_get_options(s) & SSL_OP_NO_TICKET) != 0 || CBS_len(cbs) > 0) { | 1179 | if ((SSL_get_options(s) & SSL_OP_NO_TICKET) != 0 || CBS_len(cbs) > 0) { |
| 1180 | *alert = TLS1_AD_UNSUPPORTED_EXTENSION; | 1180 | *alert = SSL_AD_UNSUPPORTED_EXTENSION; |
| 1181 | return 0; | 1181 | return 0; |
| 1182 | } | 1182 | } |
| 1183 | 1183 | ||
