diff options
Diffstat (limited to 'src/lib/libssl/d1_pkt.c')
| -rw-r--r-- | src/lib/libssl/d1_pkt.c | 29 |
1 files changed, 8 insertions, 21 deletions
diff --git a/src/lib/libssl/d1_pkt.c b/src/lib/libssl/d1_pkt.c index 4f0678f0b8..f99b8ff371 100644 --- a/src/lib/libssl/d1_pkt.c +++ b/src/lib/libssl/d1_pkt.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: d1_pkt.c,v 1.106 2021/08/30 19:12:25 jsing Exp $ */ | 1 | /* $OpenBSD: d1_pkt.c,v 1.107 2021/08/30 19:25:43 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * DTLS implementation written by Nagendra Modadugu | 3 | * DTLS implementation written by Nagendra Modadugu |
| 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. | 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. |
| @@ -515,10 +515,9 @@ dtls1_get_record(SSL *s) | |||
| 515 | int | 515 | int |
| 516 | dtls1_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek) | 516 | dtls1_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek) |
| 517 | { | 517 | { |
| 518 | int al, i, j, ret; | 518 | int al, i, ret; |
| 519 | unsigned int n; | 519 | unsigned int n; |
| 520 | SSL3_RECORD_INTERNAL *rr; | 520 | SSL3_RECORD_INTERNAL *rr; |
| 521 | void (*cb)(const SSL *ssl, int type2, int val) = NULL; | ||
| 522 | 521 | ||
| 523 | if (S3I(s)->rbuf.buf == NULL) /* Not initialized yet */ | 522 | if (S3I(s)->rbuf.buf == NULL) /* Not initialized yet */ |
| 524 | if (!ssl3_setup_buffers(s)) | 523 | if (!ssl3_setup_buffers(s)) |
| @@ -727,9 +726,8 @@ dtls1_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek) | |||
| 727 | 726 | ||
| 728 | /* no need to check sequence number on HELLO REQUEST messages */ | 727 | /* no need to check sequence number on HELLO REQUEST messages */ |
| 729 | 728 | ||
| 730 | if (s->internal->msg_callback) | 729 | ssl_msg_callback(s, 0, SSL3_RT_HANDSHAKE, |
| 731 | s->internal->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, | 730 | D1I(s)->handshake_fragment, 4); |
| 732 | D1I(s)->handshake_fragment, 4, s, s->internal->msg_callback_arg); | ||
| 733 | 731 | ||
| 734 | if (SSL_is_init_finished(s) && | 732 | if (SSL_is_init_finished(s) && |
| 735 | !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS) && | 733 | !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS) && |
| @@ -774,19 +772,10 @@ dtls1_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek) | |||
| 774 | 772 | ||
| 775 | D1I(s)->alert_fragment_len = 0; | 773 | D1I(s)->alert_fragment_len = 0; |
| 776 | 774 | ||
| 777 | if (s->internal->msg_callback) | 775 | ssl_msg_callback(s, 0, SSL3_RT_ALERT, D1I(s)->alert_fragment, 2); |
| 778 | s->internal->msg_callback(0, s->version, SSL3_RT_ALERT, | ||
| 779 | D1I(s)->alert_fragment, 2, s, s->internal->msg_callback_arg); | ||
| 780 | 776 | ||
| 781 | if (s->internal->info_callback != NULL) | 777 | ssl_info_callback(s, SSL_CB_READ_ALERT, |
| 782 | cb = s->internal->info_callback; | 778 | (alert_level << 8) | alert_descr); |
| 783 | else if (s->ctx->internal->info_callback != NULL) | ||
| 784 | cb = s->ctx->internal->info_callback; | ||
| 785 | |||
| 786 | if (cb != NULL) { | ||
| 787 | j = (alert_level << 8) | alert_descr; | ||
| 788 | cb(s, SSL_CB_READ_ALERT, j); | ||
| 789 | } | ||
| 790 | 779 | ||
| 791 | if (alert_level == SSL3_AL_WARNING) { | 780 | if (alert_level == SSL3_AL_WARNING) { |
| 792 | S3I(s)->warn_alert = alert_descr; | 781 | S3I(s)->warn_alert = alert_descr; |
| @@ -832,9 +821,7 @@ dtls1_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek) | |||
| 832 | 821 | ||
| 833 | rr->length = 0; | 822 | rr->length = 0; |
| 834 | 823 | ||
| 835 | if (s->internal->msg_callback) | 824 | ssl_msg_callback(s, 0, SSL3_RT_CHANGE_CIPHER_SPEC, rr->data, 1); |
| 836 | s->internal->msg_callback(0, s->version, SSL3_RT_CHANGE_CIPHER_SPEC, | ||
| 837 | rr->data, 1, s, s->internal->msg_callback_arg); | ||
| 838 | 825 | ||
| 839 | /* We can't process a CCS now, because previous handshake | 826 | /* We can't process a CCS now, because previous handshake |
| 840 | * messages are still missing, so just drop it. | 827 | * messages are still missing, so just drop it. |
