diff options
Diffstat (limited to 'src/lib/libssl/d1_clnt.c')
| -rw-r--r-- | src/lib/libssl/d1_clnt.c | 40 |
1 files changed, 20 insertions, 20 deletions
diff --git a/src/lib/libssl/d1_clnt.c b/src/lib/libssl/d1_clnt.c index d4b8031150..af3196ff17 100644 --- a/src/lib/libssl/d1_clnt.c +++ b/src/lib/libssl/d1_clnt.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: d1_clnt.c,v 1.61 2017/01/22 07:16:38 beck Exp $ */ | 1 | /* $OpenBSD: d1_clnt.c,v 1.62 2017/01/22 09:02:07 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * DTLS implementation written by Nagendra Modadugu | 3 | * DTLS implementation written by Nagendra Modadugu |
| 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. | 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. |
| @@ -270,7 +270,7 @@ dtls1_connect(SSL *s) | |||
| 270 | 270 | ||
| 271 | if (D1I(s)->send_cookie) { | 271 | if (D1I(s)->send_cookie) { |
| 272 | s->state = SSL3_ST_CW_FLUSH; | 272 | s->state = SSL3_ST_CW_FLUSH; |
| 273 | s->s3->tmp.next_state = SSL3_ST_CR_SRVR_HELLO_A; | 273 | S3I(s)->tmp.next_state = SSL3_ST_CR_SRVR_HELLO_A; |
| 274 | } else | 274 | } else |
| 275 | s->state = SSL3_ST_CR_SRVR_HELLO_A; | 275 | s->state = SSL3_ST_CR_SRVR_HELLO_A; |
| 276 | 276 | ||
| @@ -326,7 +326,7 @@ dtls1_connect(SSL *s) | |||
| 326 | break; | 326 | break; |
| 327 | } | 327 | } |
| 328 | /* Check if it is anon DH. */ | 328 | /* Check if it is anon DH. */ |
| 329 | if (!(s->s3->tmp.new_cipher->algorithm_auth & | 329 | if (!(S3I(s)->tmp.new_cipher->algorithm_auth & |
| 330 | SSL_aNULL)) { | 330 | SSL_aNULL)) { |
| 331 | ret = ssl3_get_server_certificate(s); | 331 | ret = ssl3_get_server_certificate(s); |
| 332 | if (ret <= 0) | 332 | if (ret <= 0) |
| @@ -373,12 +373,12 @@ dtls1_connect(SSL *s) | |||
| 373 | if (ret <= 0) | 373 | if (ret <= 0) |
| 374 | goto end; | 374 | goto end; |
| 375 | dtls1_stop_timer(s); | 375 | dtls1_stop_timer(s); |
| 376 | if (s->s3->tmp.cert_req) | 376 | if (S3I(s)->tmp.cert_req) |
| 377 | s->s3->tmp.next_state = SSL3_ST_CW_CERT_A; | 377 | S3I(s)->tmp.next_state = SSL3_ST_CW_CERT_A; |
| 378 | else | 378 | else |
| 379 | s->s3->tmp.next_state = SSL3_ST_CW_KEY_EXCH_A; | 379 | S3I(s)->tmp.next_state = SSL3_ST_CW_KEY_EXCH_A; |
| 380 | s->init_num = 0; | 380 | s->init_num = 0; |
| 381 | s->state = s->s3->tmp.next_state; | 381 | s->state = S3I(s)->tmp.next_state; |
| 382 | break; | 382 | break; |
| 383 | 383 | ||
| 384 | case SSL3_ST_CW_CERT_A: | 384 | case SSL3_ST_CW_CERT_A: |
| @@ -404,11 +404,11 @@ dtls1_connect(SSL *s) | |||
| 404 | * sent back */ | 404 | * sent back */ |
| 405 | /* For TLS, cert_req is set to 2, so a cert chain | 405 | /* For TLS, cert_req is set to 2, so a cert chain |
| 406 | * of nothing is sent, but no verify packet is sent */ | 406 | * of nothing is sent, but no verify packet is sent */ |
| 407 | if (s->s3->tmp.cert_req == 1) { | 407 | if (S3I(s)->tmp.cert_req == 1) { |
| 408 | s->state = SSL3_ST_CW_CERT_VRFY_A; | 408 | s->state = SSL3_ST_CW_CERT_VRFY_A; |
| 409 | } else { | 409 | } else { |
| 410 | s->state = SSL3_ST_CW_CHANGE_A; | 410 | s->state = SSL3_ST_CW_CHANGE_A; |
| 411 | s->s3->change_cipher_spec = 0; | 411 | S3I(s)->change_cipher_spec = 0; |
| 412 | } | 412 | } |
| 413 | 413 | ||
| 414 | s->init_num = 0; | 414 | s->init_num = 0; |
| @@ -422,7 +422,7 @@ dtls1_connect(SSL *s) | |||
| 422 | goto end; | 422 | goto end; |
| 423 | s->state = SSL3_ST_CW_CHANGE_A; | 423 | s->state = SSL3_ST_CW_CHANGE_A; |
| 424 | s->init_num = 0; | 424 | s->init_num = 0; |
| 425 | s->s3->change_cipher_spec = 0; | 425 | S3I(s)->change_cipher_spec = 0; |
| 426 | break; | 426 | break; |
| 427 | 427 | ||
| 428 | case SSL3_ST_CW_CHANGE_A: | 428 | case SSL3_ST_CW_CHANGE_A: |
| @@ -437,7 +437,7 @@ dtls1_connect(SSL *s) | |||
| 437 | s->state = SSL3_ST_CW_FINISHED_A; | 437 | s->state = SSL3_ST_CW_FINISHED_A; |
| 438 | s->init_num = 0; | 438 | s->init_num = 0; |
| 439 | 439 | ||
| 440 | s->session->cipher = s->s3->tmp.new_cipher; | 440 | s->session->cipher = S3I(s)->tmp.new_cipher; |
| 441 | if (!s->method->ssl3_enc->setup_key_block(s)) { | 441 | if (!s->method->ssl3_enc->setup_key_block(s)) { |
| 442 | ret = -1; | 442 | ret = -1; |
| 443 | goto end; | 443 | goto end; |
| @@ -468,20 +468,20 @@ dtls1_connect(SSL *s) | |||
| 468 | /* clear flags */ | 468 | /* clear flags */ |
| 469 | s->s3->flags&= ~SSL3_FLAGS_POP_BUFFER; | 469 | s->s3->flags&= ~SSL3_FLAGS_POP_BUFFER; |
| 470 | if (s->hit) { | 470 | if (s->hit) { |
| 471 | s->s3->tmp.next_state = SSL_ST_OK; | 471 | S3I(s)->tmp.next_state = SSL_ST_OK; |
| 472 | if (s->s3->flags & SSL3_FLAGS_DELAY_CLIENT_FINISHED) { | 472 | if (s->s3->flags & SSL3_FLAGS_DELAY_CLIENT_FINISHED) { |
| 473 | s->state = SSL_ST_OK; | 473 | s->state = SSL_ST_OK; |
| 474 | s->s3->flags |= SSL3_FLAGS_POP_BUFFER; | 474 | s->s3->flags |= SSL3_FLAGS_POP_BUFFER; |
| 475 | s->s3->delay_buf_pop_ret = 0; | 475 | S3I(s)->delay_buf_pop_ret = 0; |
| 476 | } | 476 | } |
| 477 | } else { | 477 | } else { |
| 478 | 478 | ||
| 479 | /* Allow NewSessionTicket if ticket expected */ | 479 | /* Allow NewSessionTicket if ticket expected */ |
| 480 | if (s->tlsext_ticket_expected) | 480 | if (s->tlsext_ticket_expected) |
| 481 | s->s3->tmp.next_state = | 481 | S3I(s)->tmp.next_state = |
| 482 | SSL3_ST_CR_SESSION_TICKET_A; | 482 | SSL3_ST_CR_SESSION_TICKET_A; |
| 483 | else | 483 | else |
| 484 | s->s3->tmp.next_state = | 484 | S3I(s)->tmp.next_state = |
| 485 | SSL3_ST_CR_FINISHED_A; | 485 | SSL3_ST_CR_FINISHED_A; |
| 486 | } | 486 | } |
| 487 | s->init_num = 0; | 487 | s->init_num = 0; |
| @@ -529,14 +529,14 @@ dtls1_connect(SSL *s) | |||
| 529 | /* If the write error was fatal, stop trying */ | 529 | /* If the write error was fatal, stop trying */ |
| 530 | if (!BIO_should_retry(s->wbio)) { | 530 | if (!BIO_should_retry(s->wbio)) { |
| 531 | s->rwstate = SSL_NOTHING; | 531 | s->rwstate = SSL_NOTHING; |
| 532 | s->state = s->s3->tmp.next_state; | 532 | s->state = S3I(s)->tmp.next_state; |
| 533 | } | 533 | } |
| 534 | 534 | ||
| 535 | ret = -1; | 535 | ret = -1; |
| 536 | goto end; | 536 | goto end; |
| 537 | } | 537 | } |
| 538 | s->rwstate = SSL_NOTHING; | 538 | s->rwstate = SSL_NOTHING; |
| 539 | s->state = s->s3->tmp.next_state; | 539 | s->state = S3I(s)->tmp.next_state; |
| 540 | break; | 540 | break; |
| 541 | 541 | ||
| 542 | case SSL_ST_OK: | 542 | case SSL_ST_OK: |
| @@ -579,7 +579,7 @@ dtls1_connect(SSL *s) | |||
| 579 | } | 579 | } |
| 580 | 580 | ||
| 581 | /* did we do anything */ | 581 | /* did we do anything */ |
| 582 | if (!s->s3->tmp.reuse_message && !skip) { | 582 | if (!S3I(s)->tmp.reuse_message && !skip) { |
| 583 | if (s->debug) { | 583 | if (s->debug) { |
| 584 | if ((ret = BIO_flush(s->wbio)) <= 0) | 584 | if ((ret = BIO_flush(s->wbio)) <= 0) |
| 585 | goto end; | 585 | goto end; |
| @@ -618,9 +618,9 @@ dtls1_get_hello_verify(SSL *s) | |||
| 618 | if (!ok) | 618 | if (!ok) |
| 619 | return ((int)n); | 619 | return ((int)n); |
| 620 | 620 | ||
| 621 | if (s->s3->tmp.message_type != DTLS1_MT_HELLO_VERIFY_REQUEST) { | 621 | if (S3I(s)->tmp.message_type != DTLS1_MT_HELLO_VERIFY_REQUEST) { |
| 622 | D1I(s)->send_cookie = 0; | 622 | D1I(s)->send_cookie = 0; |
| 623 | s->s3->tmp.reuse_message = 1; | 623 | S3I(s)->tmp.reuse_message = 1; |
| 624 | return (1); | 624 | return (1); |
| 625 | } | 625 | } |
| 626 | 626 | ||
