diff options
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libssl/d1_clnt.c | 19 | 
1 files changed, 0 insertions, 19 deletions
diff --git a/src/lib/libssl/d1_clnt.c b/src/lib/libssl/d1_clnt.c index e8b43f3268..fe5f1aa200 100644 --- a/src/lib/libssl/d1_clnt.c +++ b/src/lib/libssl/d1_clnt.c  | |||
| @@ -382,7 +382,6 @@ dtls1_connect(SSL *s) | |||
| 382 | 382 | ||
| 383 | case SSL3_ST_CR_CERT_A: | 383 | case SSL3_ST_CR_CERT_A: | 
| 384 | case SSL3_ST_CR_CERT_B: | 384 | case SSL3_ST_CR_CERT_B: | 
| 385 | #ifndef OPENSSL_NO_TLSEXT | ||
| 386 | ret = ssl3_check_finished(s); | 385 | ret = ssl3_check_finished(s); | 
| 387 | if (ret <= 0) | 386 | if (ret <= 0) | 
| 388 | goto end; | 387 | goto end; | 
| @@ -395,14 +394,12 @@ dtls1_connect(SSL *s) | |||
| 395 | s->init_num = 0; | 394 | s->init_num = 0; | 
| 396 | break; | 395 | break; | 
| 397 | } | 396 | } | 
| 398 | #endif | ||
| 399 | /* Check if it is anon DH or PSK */ | 397 | /* Check if it is anon DH or PSK */ | 
| 400 | if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && | 398 | if (!(s->s3->tmp.new_cipher->algorithm_auth & SSL_aNULL) && | 
| 401 | !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { | 399 | !(s->s3->tmp.new_cipher->algorithm_mkey & SSL_kPSK)) { | 
| 402 | ret = ssl3_get_server_certificate(s); | 400 | ret = ssl3_get_server_certificate(s); | 
| 403 | if (ret <= 0) | 401 | if (ret <= 0) | 
| 404 | goto end; | 402 | goto end; | 
| 405 | #ifndef OPENSSL_NO_TLSEXT | ||
| 406 | if (s->tlsext_status_expected) | 403 | if (s->tlsext_status_expected) | 
| 407 | s->state = SSL3_ST_CR_CERT_STATUS_A; | 404 | s->state = SSL3_ST_CR_CERT_STATUS_A; | 
| 408 | else | 405 | else | 
| @@ -411,12 +408,6 @@ dtls1_connect(SSL *s) | |||
| 411 | skip = 1; | 408 | skip = 1; | 
| 412 | s->state = SSL3_ST_CR_KEY_EXCH_A; | 409 | s->state = SSL3_ST_CR_KEY_EXCH_A; | 
| 413 | } | 410 | } | 
| 414 | #else | ||
| 415 | } else | ||
| 416 | skip = 1; | ||
| 417 | |||
| 418 | s->state = SSL3_ST_CR_KEY_EXCH_A; | ||
| 419 | #endif | ||
| 420 | s->init_num = 0; | 411 | s->init_num = 0; | 
| 421 | break; | 412 | break; | 
| 422 | 413 | ||
| @@ -626,19 +617,16 @@ dtls1_connect(SSL *s) | |||
| 626 | BIO_ctrl(SSL_get_wbio(s), BIO_CTRL_DGRAM_SCTP_NEXT_AUTH_KEY, 0, NULL); | 617 | BIO_ctrl(SSL_get_wbio(s), BIO_CTRL_DGRAM_SCTP_NEXT_AUTH_KEY, 0, NULL); | 
| 627 | #endif | 618 | #endif | 
| 628 | 619 | ||
| 629 | #ifndef OPENSSL_NO_TLSEXT | ||
| 630 | /* Allow NewSessionTicket if ticket expected */ | 620 | /* Allow NewSessionTicket if ticket expected */ | 
| 631 | if (s->tlsext_ticket_expected) | 621 | if (s->tlsext_ticket_expected) | 
| 632 | s->s3->tmp.next_state = SSL3_ST_CR_SESSION_TICKET_A; | 622 | s->s3->tmp.next_state = SSL3_ST_CR_SESSION_TICKET_A; | 
| 633 | else | 623 | else | 
| 634 | #endif | ||
| 635 | 624 | ||
| 636 | s->s3->tmp.next_state = SSL3_ST_CR_FINISHED_A; | 625 | s->s3->tmp.next_state = SSL3_ST_CR_FINISHED_A; | 
| 637 | } | 626 | } | 
| 638 | s->init_num = 0; | 627 | s->init_num = 0; | 
| 639 | break; | 628 | break; | 
| 640 | 629 | ||
| 641 | #ifndef OPENSSL_NO_TLSEXT | ||
| 642 | case SSL3_ST_CR_SESSION_TICKET_A: | 630 | case SSL3_ST_CR_SESSION_TICKET_A: | 
| 643 | case SSL3_ST_CR_SESSION_TICKET_B: | 631 | case SSL3_ST_CR_SESSION_TICKET_B: | 
| 644 | ret = ssl3_get_new_session_ticket(s); | 632 | ret = ssl3_get_new_session_ticket(s); | 
| @@ -656,7 +644,6 @@ dtls1_connect(SSL *s) | |||
| 656 | s->state = SSL3_ST_CR_KEY_EXCH_A; | 644 | s->state = SSL3_ST_CR_KEY_EXCH_A; | 
| 657 | s->init_num = 0; | 645 | s->init_num = 0; | 
| 658 | break; | 646 | break; | 
| 659 | #endif | ||
| 660 | 647 | ||
| 661 | case SSL3_ST_CR_FINISHED_A: | 648 | case SSL3_ST_CR_FINISHED_A: | 
| 662 | case SSL3_ST_CR_FINISHED_B: | 649 | case SSL3_ST_CR_FINISHED_B: | 
| @@ -787,11 +774,7 @@ dtls1_client_hello(SSL *s) | |||
| 787 | SSL_SESSION *sess = s->session; | 774 | SSL_SESSION *sess = s->session; | 
| 788 | if ((s->session == NULL) || | 775 | if ((s->session == NULL) || | 
| 789 | (s->session->ssl_version != s->version) || | 776 | (s->session->ssl_version != s->version) || | 
| 790 | #ifdef OPENSSL_NO_TLSEXT | ||
| 791 | !sess->session_id_length || | ||
| 792 | #else | ||
| 793 | (!sess->session_id_length && !sess->tlsext_tick) || | 777 | (!sess->session_id_length && !sess->tlsext_tick) || | 
| 794 | #endif | ||
| 795 | (s->session->not_resumable)) { | 778 | (s->session->not_resumable)) { | 
| 796 | if (!ssl_get_new_session(s, 0)) | 779 | if (!ssl_get_new_session(s, 0)) | 
| 797 | goto err; | 780 | goto err; | 
| @@ -864,12 +847,10 @@ dtls1_client_hello(SSL *s) | |||
| 864 | } | 847 | } | 
| 865 | *(p++) = 0; /* Add the NULL method */ | 848 | *(p++) = 0; /* Add the NULL method */ | 
| 866 | 849 | ||
| 867 | #ifndef OPENSSL_NO_TLSEXT | ||
| 868 | if ((p = ssl_add_clienthello_tlsext(s, p, buf + SSL3_RT_MAX_PLAIN_LENGTH)) == NULL) { | 850 | if ((p = ssl_add_clienthello_tlsext(s, p, buf + SSL3_RT_MAX_PLAIN_LENGTH)) == NULL) { | 
| 869 | SSLerr(SSL_F_DTLS1_CLIENT_HELLO, ERR_R_INTERNAL_ERROR); | 851 | SSLerr(SSL_F_DTLS1_CLIENT_HELLO, ERR_R_INTERNAL_ERROR); | 
| 870 | goto err; | 852 | goto err; | 
| 871 | } | 853 | } | 
| 872 | #endif | ||
| 873 | 854 | ||
| 874 | l = (p - d); | 855 | l = (p - d); | 
| 875 | d = buf; | 856 | d = buf; | 
