diff options
author | tedu <> | 2014-04-18 22:39:08 +0000 |
---|---|---|
committer | tedu <> | 2014-04-18 22:39:08 +0000 |
commit | 8b311d691c1644d610b65caacf0e7589a47eee84 (patch) | |
tree | 1cdb4470b678078d62eb1518cde846934200d4c4 /src | |
parent | 3e5241766622d5c10f810ea0b999805f06c70c7f (diff) | |
download | openbsd-8b311d691c1644d610b65caacf0e7589a47eee84.tar.gz openbsd-8b311d691c1644d610b65caacf0e7589a47eee84.tar.bz2 openbsd-8b311d691c1644d610b65caacf0e7589a47eee84.zip |
spacing
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libssl/s3_lib.c | 21 | ||||
-rw-r--r-- | src/lib/libssl/src/ssl/s3_lib.c | 21 |
2 files changed, 22 insertions, 20 deletions
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c index 7833779f6b..fe638e84a9 100644 --- a/src/lib/libssl/s3_lib.c +++ b/src/lib/libssl/s3_lib.c | |||
@@ -2777,8 +2777,9 @@ ssl3_new(SSL *s) | |||
2777 | { | 2777 | { |
2778 | SSL3_STATE *s3; | 2778 | SSL3_STATE *s3; |
2779 | 2779 | ||
2780 | if ((s3 = malloc(sizeof *s3)) == NULL) goto err; | 2780 | if ((s3 = malloc(sizeof *s3)) == NULL) |
2781 | memset(s3, 0, sizeof *s3); | 2781 | goto err; |
2782 | memset(s3, 0, sizeof *s3); | ||
2782 | memset(s3->rrec.seq_num, 0, sizeof(s3->rrec.seq_num)); | 2783 | memset(s3->rrec.seq_num, 0, sizeof(s3->rrec.seq_num)); |
2783 | memset(s3->wrec.seq_num, 0, sizeof(s3->wrec.seq_num)); | 2784 | memset(s3->wrec.seq_num, 0, sizeof(s3->wrec.seq_num)); |
2784 | 2785 | ||
@@ -3081,9 +3082,9 @@ ssl3_ctrl(SSL *s, int cmd, long larg, void *parg) | |||
3081 | 3082 | ||
3082 | #ifdef TLSEXT_TYPE_opaque_prf_input | 3083 | #ifdef TLSEXT_TYPE_opaque_prf_input |
3083 | case SSL_CTRL_SET_TLSEXT_OPAQUE_PRF_INPUT: | 3084 | case SSL_CTRL_SET_TLSEXT_OPAQUE_PRF_INPUT: |
3084 | if (larg > 12288) /* actual internal limit is 2^16 for the complete hello message | 3085 | if (larg > 12288) { |
3085 | * (including the cert chain and everything) */ | 3086 | /* actual internal limit is 2^16 for the complete hello message |
3086 | { | 3087 | * (including the cert chain and everything) */ |
3087 | SSLerr(SSL_F_SSL3_CTRL, SSL_R_OPAQUE_PRF_INPUT_TOO_LONG); | 3088 | SSLerr(SSL_F_SSL3_CTRL, SSL_R_OPAQUE_PRF_INPUT_TOO_LONG); |
3088 | break; | 3089 | break; |
3089 | } | 3090 | } |
@@ -3200,9 +3201,8 @@ ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg) | |||
3200 | case SSL_CTRL_NEED_TMP_RSA: | 3201 | case SSL_CTRL_NEED_TMP_RSA: |
3201 | if ((cert->rsa_tmp == NULL) && | 3202 | if ((cert->rsa_tmp == NULL) && |
3202 | ((cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) || | 3203 | ((cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) || |
3203 | (EVP_PKEY_size(cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512 / 8))) | 3204 | (EVP_PKEY_size(cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512 / 8)))) |
3204 | ) | 3205 | return (1); |
3205 | return (1); | ||
3206 | else | 3206 | else |
3207 | return (0); | 3207 | return (0); |
3208 | /* break; */ | 3208 | /* break; */ |
@@ -3975,8 +3975,9 @@ long | |||
3975 | ssl_get_algorithm2(SSL *s) | 3975 | ssl_get_algorithm2(SSL *s) |
3976 | { | 3976 | { |
3977 | long alg2 = s->s3->tmp.new_cipher->algorithm2; | 3977 | long alg2 = s->s3->tmp.new_cipher->algorithm2; |
3978 | |||
3978 | if (s->method->version == TLS1_2_VERSION && | 3979 | if (s->method->version == TLS1_2_VERSION && |
3979 | alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF)) | 3980 | alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF)) |
3980 | return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256; | 3981 | return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256; |
3981 | return alg2; | 3982 | return alg2; |
3982 | } | 3983 | } |
diff --git a/src/lib/libssl/src/ssl/s3_lib.c b/src/lib/libssl/src/ssl/s3_lib.c index 7833779f6b..fe638e84a9 100644 --- a/src/lib/libssl/src/ssl/s3_lib.c +++ b/src/lib/libssl/src/ssl/s3_lib.c | |||
@@ -2777,8 +2777,9 @@ ssl3_new(SSL *s) | |||
2777 | { | 2777 | { |
2778 | SSL3_STATE *s3; | 2778 | SSL3_STATE *s3; |
2779 | 2779 | ||
2780 | if ((s3 = malloc(sizeof *s3)) == NULL) goto err; | 2780 | if ((s3 = malloc(sizeof *s3)) == NULL) |
2781 | memset(s3, 0, sizeof *s3); | 2781 | goto err; |
2782 | memset(s3, 0, sizeof *s3); | ||
2782 | memset(s3->rrec.seq_num, 0, sizeof(s3->rrec.seq_num)); | 2783 | memset(s3->rrec.seq_num, 0, sizeof(s3->rrec.seq_num)); |
2783 | memset(s3->wrec.seq_num, 0, sizeof(s3->wrec.seq_num)); | 2784 | memset(s3->wrec.seq_num, 0, sizeof(s3->wrec.seq_num)); |
2784 | 2785 | ||
@@ -3081,9 +3082,9 @@ ssl3_ctrl(SSL *s, int cmd, long larg, void *parg) | |||
3081 | 3082 | ||
3082 | #ifdef TLSEXT_TYPE_opaque_prf_input | 3083 | #ifdef TLSEXT_TYPE_opaque_prf_input |
3083 | case SSL_CTRL_SET_TLSEXT_OPAQUE_PRF_INPUT: | 3084 | case SSL_CTRL_SET_TLSEXT_OPAQUE_PRF_INPUT: |
3084 | if (larg > 12288) /* actual internal limit is 2^16 for the complete hello message | 3085 | if (larg > 12288) { |
3085 | * (including the cert chain and everything) */ | 3086 | /* actual internal limit is 2^16 for the complete hello message |
3086 | { | 3087 | * (including the cert chain and everything) */ |
3087 | SSLerr(SSL_F_SSL3_CTRL, SSL_R_OPAQUE_PRF_INPUT_TOO_LONG); | 3088 | SSLerr(SSL_F_SSL3_CTRL, SSL_R_OPAQUE_PRF_INPUT_TOO_LONG); |
3088 | break; | 3089 | break; |
3089 | } | 3090 | } |
@@ -3200,9 +3201,8 @@ ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg) | |||
3200 | case SSL_CTRL_NEED_TMP_RSA: | 3201 | case SSL_CTRL_NEED_TMP_RSA: |
3201 | if ((cert->rsa_tmp == NULL) && | 3202 | if ((cert->rsa_tmp == NULL) && |
3202 | ((cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) || | 3203 | ((cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) || |
3203 | (EVP_PKEY_size(cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512 / 8))) | 3204 | (EVP_PKEY_size(cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512 / 8)))) |
3204 | ) | 3205 | return (1); |
3205 | return (1); | ||
3206 | else | 3206 | else |
3207 | return (0); | 3207 | return (0); |
3208 | /* break; */ | 3208 | /* break; */ |
@@ -3975,8 +3975,9 @@ long | |||
3975 | ssl_get_algorithm2(SSL *s) | 3975 | ssl_get_algorithm2(SSL *s) |
3976 | { | 3976 | { |
3977 | long alg2 = s->s3->tmp.new_cipher->algorithm2; | 3977 | long alg2 = s->s3->tmp.new_cipher->algorithm2; |
3978 | |||
3978 | if (s->method->version == TLS1_2_VERSION && | 3979 | if (s->method->version == TLS1_2_VERSION && |
3979 | alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF)) | 3980 | alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF)) |
3980 | return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256; | 3981 | return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256; |
3981 | return alg2; | 3982 | return alg2; |
3982 | } | 3983 | } |