diff options
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libssl/s23_srvr.c | 36 |
1 files changed, 18 insertions, 18 deletions
diff --git a/src/lib/libssl/s23_srvr.c b/src/lib/libssl/s23_srvr.c index 79c2eee521..6b5ac0cc63 100644 --- a/src/lib/libssl/s23_srvr.c +++ b/src/lib/libssl/s23_srvr.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s23_srvr.c,v 1.53 2017/01/23 04:55:26 beck Exp $ */ | 1 | /* $OpenBSD: s23_srvr.c,v 1.54 2017/01/23 06:45:30 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -152,7 +152,7 @@ ssl23_accept(SSL *s) | |||
| 152 | cb(s, SSL_CB_HANDSHAKE_START, 1); | 152 | cb(s, SSL_CB_HANDSHAKE_START, 1); |
| 153 | 153 | ||
| 154 | /* s->version=SSL3_VERSION; */ | 154 | /* s->version=SSL3_VERSION; */ |
| 155 | s->type = SSL_ST_ACCEPT; | 155 | s->internal->type = SSL_ST_ACCEPT; |
| 156 | 156 | ||
| 157 | if (!ssl3_setup_init_buffer(s)) { | 157 | if (!ssl3_setup_init_buffer(s)) { |
| 158 | ret = -1; | 158 | ret = -1; |
| @@ -165,13 +165,13 @@ ssl23_accept(SSL *s) | |||
| 165 | 165 | ||
| 166 | s->state = SSL23_ST_SR_CLNT_HELLO_A; | 166 | s->state = SSL23_ST_SR_CLNT_HELLO_A; |
| 167 | s->ctx->internal->stats.sess_accept++; | 167 | s->ctx->internal->stats.sess_accept++; |
| 168 | s->init_num = 0; | 168 | s->internal->init_num = 0; |
| 169 | break; | 169 | break; |
| 170 | 170 | ||
| 171 | case SSL23_ST_SR_CLNT_HELLO_A: | 171 | case SSL23_ST_SR_CLNT_HELLO_A: |
| 172 | case SSL23_ST_SR_CLNT_HELLO_B: | 172 | case SSL23_ST_SR_CLNT_HELLO_B: |
| 173 | 173 | ||
| 174 | s->shutdown = 0; | 174 | s->internal->shutdown = 0; |
| 175 | ret = ssl23_get_client_hello(s); | 175 | ret = ssl23_get_client_hello(s); |
| 176 | if (ret >= 0) | 176 | if (ret >= 0) |
| 177 | cb = NULL; | 177 | cb = NULL; |
| @@ -237,7 +237,7 @@ ssl23_get_client_hello(SSL *s) | |||
| 237 | if (n != sizeof buf) | 237 | if (n != sizeof buf) |
| 238 | return(n); | 238 | return(n); |
| 239 | 239 | ||
| 240 | p = s->packet; | 240 | p = s->internal->packet; |
| 241 | 241 | ||
| 242 | memcpy(buf, p, n); | 242 | memcpy(buf, p, n); |
| 243 | 243 | ||
| @@ -314,7 +314,7 @@ ssl23_get_client_hello(SSL *s) | |||
| 314 | goto unsupported; | 314 | goto unsupported; |
| 315 | 315 | ||
| 316 | type = 2; | 316 | type = 2; |
| 317 | p = s->packet; | 317 | p = s->internal->packet; |
| 318 | client_version = p[3] << 8 | p[4]; | 318 | client_version = p[3] << 8 | p[4]; |
| 319 | 319 | ||
| 320 | /* An SSLv3/TLSv1 backwards-compatible CLIENT-HELLO in an SSLv2 | 320 | /* An SSLv3/TLSv1 backwards-compatible CLIENT-HELLO in an SSLv2 |
| @@ -344,18 +344,18 @@ ssl23_get_client_hello(SSL *s) | |||
| 344 | if (j != n + 2) | 344 | if (j != n + 2) |
| 345 | return -1; | 345 | return -1; |
| 346 | 346 | ||
| 347 | tls1_finish_mac(s, s->packet + 2, s->packet_length - 2); | 347 | tls1_finish_mac(s, s->internal->packet + 2, s->internal->packet_length - 2); |
| 348 | if (s->internal->msg_callback) | 348 | if (s->internal->msg_callback) |
| 349 | s->internal->msg_callback(0, SSL2_VERSION, 0, s->packet + 2, | 349 | s->internal->msg_callback(0, SSL2_VERSION, 0, s->internal->packet + 2, |
| 350 | s->packet_length - 2, s, s->internal->msg_callback_arg); | 350 | s->internal->packet_length - 2, s, s->internal->msg_callback_arg); |
| 351 | 351 | ||
| 352 | p = s->packet; | 352 | p = s->internal->packet; |
| 353 | p += 5; | 353 | p += 5; |
| 354 | n2s(p, csl); | 354 | n2s(p, csl); |
| 355 | n2s(p, sil); | 355 | n2s(p, sil); |
| 356 | n2s(p, cl); | 356 | n2s(p, cl); |
| 357 | d = (unsigned char *)s->init_buf->data; | 357 | d = (unsigned char *)s->internal->init_buf->data; |
| 358 | if ((csl + sil + cl + 11) != s->packet_length) { | 358 | if ((csl + sil + cl + 11) != s->internal->packet_length) { |
| 359 | /* | 359 | /* |
| 360 | * We can't have TLS extensions in SSL 2.0 format | 360 | * We can't have TLS extensions in SSL 2.0 format |
| 361 | * Client Hello, can we ? Error condition should be | 361 | * Client Hello, can we ? Error condition should be |
| @@ -403,7 +403,7 @@ ssl23_get_client_hello(SSL *s) | |||
| 403 | *(d++) = 1; | 403 | *(d++) = 1; |
| 404 | *(d++) = 0; | 404 | *(d++) = 0; |
| 405 | 405 | ||
| 406 | i = (d - (unsigned char *)s->init_buf->data) - 4; | 406 | i = (d - (unsigned char *)s->internal->init_buf->data) - 4; |
| 407 | l2n3((long)i, d_len); | 407 | l2n3((long)i, d_len); |
| 408 | 408 | ||
| 409 | /* get the data reused from the init_buf */ | 409 | /* get the data reused from the init_buf */ |
| @@ -428,17 +428,17 @@ ssl23_get_client_hello(SSL *s) | |||
| 428 | /* put the 'n' bytes we have read into the input buffer | 428 | /* put the 'n' bytes we have read into the input buffer |
| 429 | * for SSLv3 */ | 429 | * for SSLv3 */ |
| 430 | s->rstate = SSL_ST_READ_HEADER; | 430 | s->rstate = SSL_ST_READ_HEADER; |
| 431 | s->packet_length = n; | 431 | s->internal->packet_length = n; |
| 432 | if (s->s3->rbuf.buf == NULL) | 432 | if (s->s3->rbuf.buf == NULL) |
| 433 | if (!ssl3_setup_read_buffer(s)) | 433 | if (!ssl3_setup_read_buffer(s)) |
| 434 | return -1; | 434 | return -1; |
| 435 | 435 | ||
| 436 | s->packet = &(s->s3->rbuf.buf[0]); | 436 | s->internal->packet = &(s->s3->rbuf.buf[0]); |
| 437 | memcpy(s->packet, buf, n); | 437 | memcpy(s->internal->packet, buf, n); |
| 438 | s->s3->rbuf.left = n; | 438 | s->s3->rbuf.left = n; |
| 439 | s->s3->rbuf.offset = 0; | 439 | s->s3->rbuf.offset = 0; |
| 440 | } else { | 440 | } else { |
| 441 | s->packet_length = 0; | 441 | s->internal->packet_length = 0; |
| 442 | s->s3->rbuf.left = 0; | 442 | s->s3->rbuf.left = 0; |
| 443 | s->s3->rbuf.offset = 0; | 443 | s->s3->rbuf.offset = 0; |
| 444 | } | 444 | } |
| @@ -456,7 +456,7 @@ ssl23_get_client_hello(SSL *s) | |||
| 456 | SSLerr(SSL_F_SSL23_GET_CLIENT_HELLO, SSL_R_UNKNOWN_PROTOCOL); | 456 | SSLerr(SSL_F_SSL23_GET_CLIENT_HELLO, SSL_R_UNKNOWN_PROTOCOL); |
| 457 | return -1; | 457 | return -1; |
| 458 | } | 458 | } |
| 459 | s->init_num = 0; | 459 | s->internal->init_num = 0; |
| 460 | 460 | ||
| 461 | return (SSL_accept(s)); | 461 | return (SSL_accept(s)); |
| 462 | 462 | ||
