diff options
author | jsing <> | 2014-07-13 00:30:07 +0000 |
---|---|---|
committer | jsing <> | 2014-07-13 00:30:07 +0000 |
commit | a6ba1a5d2fcf97f553aee1fbc4215ea2f01ff04c (patch) | |
tree | 2b1b9cde1f1ebf56457589cc62a1ddab0048490c /src | |
parent | f71c90f56cd6034e8039aaf214838e8ead46548b (diff) | |
download | openbsd-a6ba1a5d2fcf97f553aee1fbc4215ea2f01ff04c.tar.gz openbsd-a6ba1a5d2fcf97f553aee1fbc4215ea2f01ff04c.tar.bz2 openbsd-a6ba1a5d2fcf97f553aee1fbc4215ea2f01ff04c.zip |
KNF and some code cleaning.
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libssl/src/ssl/ssl_asn1.c | 82 | ||||
-rw-r--r-- | src/lib/libssl/ssl_asn1.c | 82 |
2 files changed, 92 insertions, 72 deletions
diff --git a/src/lib/libssl/src/ssl/ssl_asn1.c b/src/lib/libssl/src/ssl/ssl_asn1.c index a721612bbc..0c9b4aa6fb 100644 --- a/src/lib/libssl/src/ssl/ssl_asn1.c +++ b/src/lib/libssl/src/ssl/ssl_asn1.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_asn1.c,v 1.29 2014/07/11 12:07:30 miod Exp $ */ | 1 | /* $OpenBSD: ssl_asn1.c,v 1.30 2014/07/13 00:30:07 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -84,7 +84,9 @@ | |||
84 | 84 | ||
85 | #include <stdio.h> | 85 | #include <stdio.h> |
86 | #include <stdlib.h> | 86 | #include <stdlib.h> |
87 | |||
87 | #include "ssl_locl.h" | 88 | #include "ssl_locl.h" |
89 | |||
88 | #include <openssl/asn1_mac.h> | 90 | #include <openssl/asn1_mac.h> |
89 | #include <openssl/objects.h> | 91 | #include <openssl/objects.h> |
90 | #include <openssl/x509.h> | 92 | #include <openssl/x509.h> |
@@ -109,23 +111,24 @@ int | |||
109 | i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | 111 | i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) |
110 | { | 112 | { |
111 | #define LSIZE2 (sizeof(long)*2) | 113 | #define LSIZE2 (sizeof(long)*2) |
112 | int v1 = 0, v2 = 0, v3 = 0, v4 = 0, v5 = 0; | 114 | int v1 = 0, v2 = 0, v3 = 0, v4 = 0, v5 = 0, v6 = 0, v9 = 0, v10 = 0; |
113 | unsigned char buf[4], ibuf1[LSIZE2], ibuf2[LSIZE2]; | 115 | unsigned char buf[4], ibuf1[LSIZE2], ibuf2[LSIZE2]; |
114 | unsigned char ibuf3[LSIZE2], ibuf4[LSIZE2], ibuf5[LSIZE2]; | 116 | unsigned char ibuf3[LSIZE2], ibuf4[LSIZE2], ibuf5[LSIZE2]; |
115 | int v6 = 0, v9 = 0, v10 = 0; | ||
116 | unsigned char ibuf6[LSIZE2]; | 117 | unsigned char ibuf6[LSIZE2]; |
117 | long l; | ||
118 | SSL_SESSION_ASN1 a; | 118 | SSL_SESSION_ASN1 a; |
119 | M_ASN1_I2D_vars(in); | 119 | M_ASN1_I2D_vars(in); |
120 | long l; | ||
120 | 121 | ||
121 | if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0))) | 122 | if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0))) |
122 | return (0); | 123 | return (0); |
123 | 124 | ||
124 | /* Note that I cheat in the following 2 assignments. I know | 125 | /* |
125 | * that if the ASN1_INTEGER passed to ASN1_INTEGER_set | 126 | * Note that I cheat in the following 2 assignments. |
127 | * I know that if the ASN1_INTEGER passed to ASN1_INTEGER_set | ||
126 | * is > sizeof(long)+1, the buffer will not be re-malloc()ed. | 128 | * is > sizeof(long)+1, the buffer will not be re-malloc()ed. |
127 | * This is a bit evil but makes things simple, no dynamic allocation | 129 | * This is a bit evil but makes things simple, no dynamic allocation |
128 | * to clean up :-) */ | 130 | * to clean up :-) |
131 | */ | ||
129 | a.version.length = LSIZE2; | 132 | a.version.length = LSIZE2; |
130 | a.version.type = V_ASN1_INTEGER; | 133 | a.version.type = V_ASN1_INTEGER; |
131 | a.version.data = ibuf1; | 134 | a.version.data = ibuf1; |
@@ -147,7 +150,6 @@ i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | |||
147 | buf[0] = ((unsigned char)(l >> 8L))&0xff; | 150 | buf[0] = ((unsigned char)(l >> 8L))&0xff; |
148 | buf[1] = ((unsigned char)(l ))&0xff; | 151 | buf[1] = ((unsigned char)(l ))&0xff; |
149 | 152 | ||
150 | |||
151 | a.master_key.length = in->master_key_length; | 153 | a.master_key.length = in->master_key_length; |
152 | a.master_key.type = V_ASN1_OCTET_STRING; | 154 | a.master_key.type = V_ASN1_OCTET_STRING; |
153 | a.master_key.data = in->master_key; | 155 | a.master_key.data = in->master_key; |
@@ -160,7 +162,6 @@ i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | |||
160 | a.session_id_context.type = V_ASN1_OCTET_STRING; | 162 | a.session_id_context.type = V_ASN1_OCTET_STRING; |
161 | a.session_id_context.data = in->sid_ctx; | 163 | a.session_id_context.data = in->sid_ctx; |
162 | 164 | ||
163 | |||
164 | if (in->time != 0L) { | 165 | if (in->time != 0L) { |
165 | a.time.length = LSIZE2; | 166 | a.time.length = LSIZE2; |
166 | a.time.type = V_ASN1_INTEGER; | 167 | a.time.type = V_ASN1_INTEGER; |
@@ -196,54 +197,65 @@ i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | |||
196 | a.tlsext_tick_lifetime.length = LSIZE2; | 197 | a.tlsext_tick_lifetime.length = LSIZE2; |
197 | a.tlsext_tick_lifetime.type = V_ASN1_INTEGER; | 198 | a.tlsext_tick_lifetime.type = V_ASN1_INTEGER; |
198 | a.tlsext_tick_lifetime.data = ibuf6; | 199 | a.tlsext_tick_lifetime.data = ibuf6; |
199 | ASN1_INTEGER_set(&a.tlsext_tick_lifetime, in->tlsext_tick_lifetime_hint); | 200 | ASN1_INTEGER_set(&a.tlsext_tick_lifetime, |
201 | in->tlsext_tick_lifetime_hint); | ||
200 | } | 202 | } |
201 | 203 | ||
202 | M_ASN1_I2D_len(&(a.version), i2d_ASN1_INTEGER); | 204 | M_ASN1_I2D_len(&(a.version), i2d_ASN1_INTEGER); |
203 | M_ASN1_I2D_len(&(a.ssl_version), i2d_ASN1_INTEGER); | 205 | M_ASN1_I2D_len(&(a.ssl_version), i2d_ASN1_INTEGER); |
204 | M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); | 206 | M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); |
205 | M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING); | 207 | M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING); |
206 | M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); | 208 | M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); |
209 | |||
207 | if (in->time != 0L) | 210 | if (in->time != 0L) |
208 | M_ASN1_I2D_len_EXP_opt(&(a.time), i2d_ASN1_INTEGER, 1, v1); | 211 | M_ASN1_I2D_len_EXP_opt(&(a.time), i2d_ASN1_INTEGER, 1, v1); |
209 | if (in->timeout != 0L) | 212 | if (in->timeout != 0L) |
210 | M_ASN1_I2D_len_EXP_opt(&(a.timeout), i2d_ASN1_INTEGER, 2, v2); | 213 | M_ASN1_I2D_len_EXP_opt(&(a.timeout), i2d_ASN1_INTEGER, 2, v2); |
211 | if (in->peer != NULL) | 214 | if (in->peer != NULL) |
212 | M_ASN1_I2D_len_EXP_opt(in->peer, i2d_X509, 3, v3); | 215 | M_ASN1_I2D_len_EXP_opt(in->peer, i2d_X509, 3, v3); |
213 | M_ASN1_I2D_len_EXP_opt(&a.session_id_context, i2d_ASN1_OCTET_STRING, 4, v4); | 216 | M_ASN1_I2D_len_EXP_opt(&a.session_id_context, |
217 | i2d_ASN1_OCTET_STRING, 4, v4); | ||
214 | if (in->verify_result != X509_V_OK) | 218 | if (in->verify_result != X509_V_OK) |
215 | M_ASN1_I2D_len_EXP_opt(&(a.verify_result), i2d_ASN1_INTEGER, 5, v5); | 219 | M_ASN1_I2D_len_EXP_opt(&(a.verify_result), |
216 | 220 | i2d_ASN1_INTEGER, 5, v5); | |
217 | if (in->tlsext_tick_lifetime_hint > 0) | 221 | if (in->tlsext_tick_lifetime_hint > 0) |
218 | M_ASN1_I2D_len_EXP_opt(&a.tlsext_tick_lifetime, i2d_ASN1_INTEGER, 9, v9); | 222 | M_ASN1_I2D_len_EXP_opt(&a.tlsext_tick_lifetime, |
223 | i2d_ASN1_INTEGER, 9, v9); | ||
219 | if (in->tlsext_tick) | 224 | if (in->tlsext_tick) |
220 | M_ASN1_I2D_len_EXP_opt(&(a.tlsext_tick), i2d_ASN1_OCTET_STRING, 10, v10); | 225 | M_ASN1_I2D_len_EXP_opt(&(a.tlsext_tick), |
226 | i2d_ASN1_OCTET_STRING, 10, v10); | ||
221 | if (in->tlsext_hostname) | 227 | if (in->tlsext_hostname) |
222 | M_ASN1_I2D_len_EXP_opt(&(a.tlsext_hostname), i2d_ASN1_OCTET_STRING, 6, v6); | 228 | M_ASN1_I2D_len_EXP_opt(&(a.tlsext_hostname), |
229 | i2d_ASN1_OCTET_STRING, 6, v6); | ||
223 | 230 | ||
224 | M_ASN1_I2D_seq_total(); | 231 | M_ASN1_I2D_seq_total(); |
225 | 232 | ||
226 | M_ASN1_I2D_put(&(a.version), i2d_ASN1_INTEGER); | 233 | M_ASN1_I2D_put(&(a.version), i2d_ASN1_INTEGER); |
227 | M_ASN1_I2D_put(&(a.ssl_version), i2d_ASN1_INTEGER); | 234 | M_ASN1_I2D_put(&(a.ssl_version), i2d_ASN1_INTEGER); |
228 | M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRING); | 235 | M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRING); |
229 | M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING); | 236 | M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING); |
230 | M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); | 237 | M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); |
231 | if (in->time != 0L) | 238 | if (in->time != 0L) |
232 | M_ASN1_I2D_put_EXP_opt(&(a.time), i2d_ASN1_INTEGER, 1, v1); | 239 | M_ASN1_I2D_put_EXP_opt(&(a.time), i2d_ASN1_INTEGER, 1, v1); |
233 | if (in->timeout != 0L) | 240 | if (in->timeout != 0L) |
234 | M_ASN1_I2D_put_EXP_opt(&(a.timeout), i2d_ASN1_INTEGER, 2, v2); | 241 | M_ASN1_I2D_put_EXP_opt(&(a.timeout), i2d_ASN1_INTEGER, 2, v2); |
235 | if (in->peer != NULL) | 242 | if (in->peer != NULL) |
236 | M_ASN1_I2D_put_EXP_opt(in->peer, i2d_X509, 3, v3); | 243 | M_ASN1_I2D_put_EXP_opt(in->peer, i2d_X509, 3, v3); |
237 | M_ASN1_I2D_put_EXP_opt(&a.session_id_context, i2d_ASN1_OCTET_STRING, 4, | 244 | M_ASN1_I2D_put_EXP_opt(&a.session_id_context, |
238 | v4); | 245 | i2d_ASN1_OCTET_STRING, 4, v4); |
239 | if (in->verify_result != X509_V_OK) | 246 | if (in->verify_result != X509_V_OK) |
240 | M_ASN1_I2D_put_EXP_opt(&a.verify_result, i2d_ASN1_INTEGER, 5, v5); | 247 | M_ASN1_I2D_put_EXP_opt(&a.verify_result, |
248 | i2d_ASN1_INTEGER, 5, v5); | ||
241 | if (in->tlsext_hostname) | 249 | if (in->tlsext_hostname) |
242 | M_ASN1_I2D_put_EXP_opt(&(a.tlsext_hostname), i2d_ASN1_OCTET_STRING, 6, v6); | 250 | M_ASN1_I2D_put_EXP_opt(&(a.tlsext_hostname), |
251 | i2d_ASN1_OCTET_STRING, 6, v6); | ||
243 | if (in->tlsext_tick_lifetime_hint > 0) | 252 | if (in->tlsext_tick_lifetime_hint > 0) |
244 | M_ASN1_I2D_put_EXP_opt(&a.tlsext_tick_lifetime, i2d_ASN1_INTEGER, 9, v9); | 253 | M_ASN1_I2D_put_EXP_opt(&a.tlsext_tick_lifetime, |
254 | i2d_ASN1_INTEGER, 9, v9); | ||
245 | if (in->tlsext_tick) | 255 | if (in->tlsext_tick) |
246 | M_ASN1_I2D_put_EXP_opt(&(a.tlsext_tick), i2d_ASN1_OCTET_STRING, 10, v10); | 256 | M_ASN1_I2D_put_EXP_opt(&(a.tlsext_tick), |
257 | i2d_ASN1_OCTET_STRING, 10, v10); | ||
258 | |||
247 | M_ASN1_I2D_finish(); | 259 | M_ASN1_I2D_finish(); |
248 | } | 260 | } |
249 | 261 | ||
@@ -290,9 +302,8 @@ d2i_SSL_SESSION(SSL_SESSION **a, const unsigned char **pp, long length) | |||
290 | c.line = __LINE__; | 302 | c.line = __LINE__; |
291 | goto err; | 303 | goto err; |
292 | } | 304 | } |
293 | id = 0x03000000L| | 305 | id = 0x03000000L | ((unsigned long)os.data[0]<<8L) | |
294 | ((unsigned long)os.data[0]<<8L)| | 306 | (unsigned long)os.data[1]; |
295 | (unsigned long)os.data[1]; | ||
296 | } else { | 307 | } else { |
297 | c.error = SSL_R_UNKNOWN_SSL_VERSION; | 308 | c.error = SSL_R_UNKNOWN_SSL_VERSION; |
298 | c.line = __LINE__; | 309 | c.line = __LINE__; |
@@ -413,6 +424,5 @@ d2i_SSL_SESSION(SSL_SESSION **a, const unsigned char **pp, long length) | |||
413 | } else | 424 | } else |
414 | ret->tlsext_tick = NULL; | 425 | ret->tlsext_tick = NULL; |
415 | 426 | ||
416 | |||
417 | M_ASN1_D2I_Finish(a, SSL_SESSION_free, SSL_F_D2I_SSL_SESSION); | 427 | M_ASN1_D2I_Finish(a, SSL_SESSION_free, SSL_F_D2I_SSL_SESSION); |
418 | } | 428 | } |
diff --git a/src/lib/libssl/ssl_asn1.c b/src/lib/libssl/ssl_asn1.c index a721612bbc..0c9b4aa6fb 100644 --- a/src/lib/libssl/ssl_asn1.c +++ b/src/lib/libssl/ssl_asn1.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_asn1.c,v 1.29 2014/07/11 12:07:30 miod Exp $ */ | 1 | /* $OpenBSD: ssl_asn1.c,v 1.30 2014/07/13 00:30:07 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -84,7 +84,9 @@ | |||
84 | 84 | ||
85 | #include <stdio.h> | 85 | #include <stdio.h> |
86 | #include <stdlib.h> | 86 | #include <stdlib.h> |
87 | |||
87 | #include "ssl_locl.h" | 88 | #include "ssl_locl.h" |
89 | |||
88 | #include <openssl/asn1_mac.h> | 90 | #include <openssl/asn1_mac.h> |
89 | #include <openssl/objects.h> | 91 | #include <openssl/objects.h> |
90 | #include <openssl/x509.h> | 92 | #include <openssl/x509.h> |
@@ -109,23 +111,24 @@ int | |||
109 | i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | 111 | i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) |
110 | { | 112 | { |
111 | #define LSIZE2 (sizeof(long)*2) | 113 | #define LSIZE2 (sizeof(long)*2) |
112 | int v1 = 0, v2 = 0, v3 = 0, v4 = 0, v5 = 0; | 114 | int v1 = 0, v2 = 0, v3 = 0, v4 = 0, v5 = 0, v6 = 0, v9 = 0, v10 = 0; |
113 | unsigned char buf[4], ibuf1[LSIZE2], ibuf2[LSIZE2]; | 115 | unsigned char buf[4], ibuf1[LSIZE2], ibuf2[LSIZE2]; |
114 | unsigned char ibuf3[LSIZE2], ibuf4[LSIZE2], ibuf5[LSIZE2]; | 116 | unsigned char ibuf3[LSIZE2], ibuf4[LSIZE2], ibuf5[LSIZE2]; |
115 | int v6 = 0, v9 = 0, v10 = 0; | ||
116 | unsigned char ibuf6[LSIZE2]; | 117 | unsigned char ibuf6[LSIZE2]; |
117 | long l; | ||
118 | SSL_SESSION_ASN1 a; | 118 | SSL_SESSION_ASN1 a; |
119 | M_ASN1_I2D_vars(in); | 119 | M_ASN1_I2D_vars(in); |
120 | long l; | ||
120 | 121 | ||
121 | if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0))) | 122 | if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0))) |
122 | return (0); | 123 | return (0); |
123 | 124 | ||
124 | /* Note that I cheat in the following 2 assignments. I know | 125 | /* |
125 | * that if the ASN1_INTEGER passed to ASN1_INTEGER_set | 126 | * Note that I cheat in the following 2 assignments. |
127 | * I know that if the ASN1_INTEGER passed to ASN1_INTEGER_set | ||
126 | * is > sizeof(long)+1, the buffer will not be re-malloc()ed. | 128 | * is > sizeof(long)+1, the buffer will not be re-malloc()ed. |
127 | * This is a bit evil but makes things simple, no dynamic allocation | 129 | * This is a bit evil but makes things simple, no dynamic allocation |
128 | * to clean up :-) */ | 130 | * to clean up :-) |
131 | */ | ||
129 | a.version.length = LSIZE2; | 132 | a.version.length = LSIZE2; |
130 | a.version.type = V_ASN1_INTEGER; | 133 | a.version.type = V_ASN1_INTEGER; |
131 | a.version.data = ibuf1; | 134 | a.version.data = ibuf1; |
@@ -147,7 +150,6 @@ i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | |||
147 | buf[0] = ((unsigned char)(l >> 8L))&0xff; | 150 | buf[0] = ((unsigned char)(l >> 8L))&0xff; |
148 | buf[1] = ((unsigned char)(l ))&0xff; | 151 | buf[1] = ((unsigned char)(l ))&0xff; |
149 | 152 | ||
150 | |||
151 | a.master_key.length = in->master_key_length; | 153 | a.master_key.length = in->master_key_length; |
152 | a.master_key.type = V_ASN1_OCTET_STRING; | 154 | a.master_key.type = V_ASN1_OCTET_STRING; |
153 | a.master_key.data = in->master_key; | 155 | a.master_key.data = in->master_key; |
@@ -160,7 +162,6 @@ i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | |||
160 | a.session_id_context.type = V_ASN1_OCTET_STRING; | 162 | a.session_id_context.type = V_ASN1_OCTET_STRING; |
161 | a.session_id_context.data = in->sid_ctx; | 163 | a.session_id_context.data = in->sid_ctx; |
162 | 164 | ||
163 | |||
164 | if (in->time != 0L) { | 165 | if (in->time != 0L) { |
165 | a.time.length = LSIZE2; | 166 | a.time.length = LSIZE2; |
166 | a.time.type = V_ASN1_INTEGER; | 167 | a.time.type = V_ASN1_INTEGER; |
@@ -196,54 +197,65 @@ i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | |||
196 | a.tlsext_tick_lifetime.length = LSIZE2; | 197 | a.tlsext_tick_lifetime.length = LSIZE2; |
197 | a.tlsext_tick_lifetime.type = V_ASN1_INTEGER; | 198 | a.tlsext_tick_lifetime.type = V_ASN1_INTEGER; |
198 | a.tlsext_tick_lifetime.data = ibuf6; | 199 | a.tlsext_tick_lifetime.data = ibuf6; |
199 | ASN1_INTEGER_set(&a.tlsext_tick_lifetime, in->tlsext_tick_lifetime_hint); | 200 | ASN1_INTEGER_set(&a.tlsext_tick_lifetime, |
201 | in->tlsext_tick_lifetime_hint); | ||
200 | } | 202 | } |
201 | 203 | ||
202 | M_ASN1_I2D_len(&(a.version), i2d_ASN1_INTEGER); | 204 | M_ASN1_I2D_len(&(a.version), i2d_ASN1_INTEGER); |
203 | M_ASN1_I2D_len(&(a.ssl_version), i2d_ASN1_INTEGER); | 205 | M_ASN1_I2D_len(&(a.ssl_version), i2d_ASN1_INTEGER); |
204 | M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); | 206 | M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); |
205 | M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING); | 207 | M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING); |
206 | M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); | 208 | M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); |
209 | |||
207 | if (in->time != 0L) | 210 | if (in->time != 0L) |
208 | M_ASN1_I2D_len_EXP_opt(&(a.time), i2d_ASN1_INTEGER, 1, v1); | 211 | M_ASN1_I2D_len_EXP_opt(&(a.time), i2d_ASN1_INTEGER, 1, v1); |
209 | if (in->timeout != 0L) | 212 | if (in->timeout != 0L) |
210 | M_ASN1_I2D_len_EXP_opt(&(a.timeout), i2d_ASN1_INTEGER, 2, v2); | 213 | M_ASN1_I2D_len_EXP_opt(&(a.timeout), i2d_ASN1_INTEGER, 2, v2); |
211 | if (in->peer != NULL) | 214 | if (in->peer != NULL) |
212 | M_ASN1_I2D_len_EXP_opt(in->peer, i2d_X509, 3, v3); | 215 | M_ASN1_I2D_len_EXP_opt(in->peer, i2d_X509, 3, v3); |
213 | M_ASN1_I2D_len_EXP_opt(&a.session_id_context, i2d_ASN1_OCTET_STRING, 4, v4); | 216 | M_ASN1_I2D_len_EXP_opt(&a.session_id_context, |
217 | i2d_ASN1_OCTET_STRING, 4, v4); | ||
214 | if (in->verify_result != X509_V_OK) | 218 | if (in->verify_result != X509_V_OK) |
215 | M_ASN1_I2D_len_EXP_opt(&(a.verify_result), i2d_ASN1_INTEGER, 5, v5); | 219 | M_ASN1_I2D_len_EXP_opt(&(a.verify_result), |
216 | 220 | i2d_ASN1_INTEGER, 5, v5); | |
217 | if (in->tlsext_tick_lifetime_hint > 0) | 221 | if (in->tlsext_tick_lifetime_hint > 0) |
218 | M_ASN1_I2D_len_EXP_opt(&a.tlsext_tick_lifetime, i2d_ASN1_INTEGER, 9, v9); | 222 | M_ASN1_I2D_len_EXP_opt(&a.tlsext_tick_lifetime, |
223 | i2d_ASN1_INTEGER, 9, v9); | ||
219 | if (in->tlsext_tick) | 224 | if (in->tlsext_tick) |
220 | M_ASN1_I2D_len_EXP_opt(&(a.tlsext_tick), i2d_ASN1_OCTET_STRING, 10, v10); | 225 | M_ASN1_I2D_len_EXP_opt(&(a.tlsext_tick), |
226 | i2d_ASN1_OCTET_STRING, 10, v10); | ||
221 | if (in->tlsext_hostname) | 227 | if (in->tlsext_hostname) |
222 | M_ASN1_I2D_len_EXP_opt(&(a.tlsext_hostname), i2d_ASN1_OCTET_STRING, 6, v6); | 228 | M_ASN1_I2D_len_EXP_opt(&(a.tlsext_hostname), |
229 | i2d_ASN1_OCTET_STRING, 6, v6); | ||
223 | 230 | ||
224 | M_ASN1_I2D_seq_total(); | 231 | M_ASN1_I2D_seq_total(); |
225 | 232 | ||
226 | M_ASN1_I2D_put(&(a.version), i2d_ASN1_INTEGER); | 233 | M_ASN1_I2D_put(&(a.version), i2d_ASN1_INTEGER); |
227 | M_ASN1_I2D_put(&(a.ssl_version), i2d_ASN1_INTEGER); | 234 | M_ASN1_I2D_put(&(a.ssl_version), i2d_ASN1_INTEGER); |
228 | M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRING); | 235 | M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRING); |
229 | M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING); | 236 | M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING); |
230 | M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); | 237 | M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); |
231 | if (in->time != 0L) | 238 | if (in->time != 0L) |
232 | M_ASN1_I2D_put_EXP_opt(&(a.time), i2d_ASN1_INTEGER, 1, v1); | 239 | M_ASN1_I2D_put_EXP_opt(&(a.time), i2d_ASN1_INTEGER, 1, v1); |
233 | if (in->timeout != 0L) | 240 | if (in->timeout != 0L) |
234 | M_ASN1_I2D_put_EXP_opt(&(a.timeout), i2d_ASN1_INTEGER, 2, v2); | 241 | M_ASN1_I2D_put_EXP_opt(&(a.timeout), i2d_ASN1_INTEGER, 2, v2); |
235 | if (in->peer != NULL) | 242 | if (in->peer != NULL) |
236 | M_ASN1_I2D_put_EXP_opt(in->peer, i2d_X509, 3, v3); | 243 | M_ASN1_I2D_put_EXP_opt(in->peer, i2d_X509, 3, v3); |
237 | M_ASN1_I2D_put_EXP_opt(&a.session_id_context, i2d_ASN1_OCTET_STRING, 4, | 244 | M_ASN1_I2D_put_EXP_opt(&a.session_id_context, |
238 | v4); | 245 | i2d_ASN1_OCTET_STRING, 4, v4); |
239 | if (in->verify_result != X509_V_OK) | 246 | if (in->verify_result != X509_V_OK) |
240 | M_ASN1_I2D_put_EXP_opt(&a.verify_result, i2d_ASN1_INTEGER, 5, v5); | 247 | M_ASN1_I2D_put_EXP_opt(&a.verify_result, |
248 | i2d_ASN1_INTEGER, 5, v5); | ||
241 | if (in->tlsext_hostname) | 249 | if (in->tlsext_hostname) |
242 | M_ASN1_I2D_put_EXP_opt(&(a.tlsext_hostname), i2d_ASN1_OCTET_STRING, 6, v6); | 250 | M_ASN1_I2D_put_EXP_opt(&(a.tlsext_hostname), |
251 | i2d_ASN1_OCTET_STRING, 6, v6); | ||
243 | if (in->tlsext_tick_lifetime_hint > 0) | 252 | if (in->tlsext_tick_lifetime_hint > 0) |
244 | M_ASN1_I2D_put_EXP_opt(&a.tlsext_tick_lifetime, i2d_ASN1_INTEGER, 9, v9); | 253 | M_ASN1_I2D_put_EXP_opt(&a.tlsext_tick_lifetime, |
254 | i2d_ASN1_INTEGER, 9, v9); | ||
245 | if (in->tlsext_tick) | 255 | if (in->tlsext_tick) |
246 | M_ASN1_I2D_put_EXP_opt(&(a.tlsext_tick), i2d_ASN1_OCTET_STRING, 10, v10); | 256 | M_ASN1_I2D_put_EXP_opt(&(a.tlsext_tick), |
257 | i2d_ASN1_OCTET_STRING, 10, v10); | ||
258 | |||
247 | M_ASN1_I2D_finish(); | 259 | M_ASN1_I2D_finish(); |
248 | } | 260 | } |
249 | 261 | ||
@@ -290,9 +302,8 @@ d2i_SSL_SESSION(SSL_SESSION **a, const unsigned char **pp, long length) | |||
290 | c.line = __LINE__; | 302 | c.line = __LINE__; |
291 | goto err; | 303 | goto err; |
292 | } | 304 | } |
293 | id = 0x03000000L| | 305 | id = 0x03000000L | ((unsigned long)os.data[0]<<8L) | |
294 | ((unsigned long)os.data[0]<<8L)| | 306 | (unsigned long)os.data[1]; |
295 | (unsigned long)os.data[1]; | ||
296 | } else { | 307 | } else { |
297 | c.error = SSL_R_UNKNOWN_SSL_VERSION; | 308 | c.error = SSL_R_UNKNOWN_SSL_VERSION; |
298 | c.line = __LINE__; | 309 | c.line = __LINE__; |
@@ -413,6 +424,5 @@ d2i_SSL_SESSION(SSL_SESSION **a, const unsigned char **pp, long length) | |||
413 | } else | 424 | } else |
414 | ret->tlsext_tick = NULL; | 425 | ret->tlsext_tick = NULL; |
415 | 426 | ||
416 | |||
417 | M_ASN1_D2I_Finish(a, SSL_SESSION_free, SSL_F_D2I_SSL_SESSION); | 427 | M_ASN1_D2I_Finish(a, SSL_SESSION_free, SSL_F_D2I_SSL_SESSION); |
418 | } | 428 | } |