summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s23_srvr.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/s23_srvr.c')
-rw-r--r--src/lib/libssl/s23_srvr.c36
1 files changed, 18 insertions, 18 deletions
diff --git a/src/lib/libssl/s23_srvr.c b/src/lib/libssl/s23_srvr.c
index 79c2eee521..6b5ac0cc63 100644
--- a/src/lib/libssl/s23_srvr.c
+++ b/src/lib/libssl/s23_srvr.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: s23_srvr.c,v 1.53 2017/01/23 04:55:26 beck Exp $ */ 1/* $OpenBSD: s23_srvr.c,v 1.54 2017/01/23 06:45:30 beck Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -152,7 +152,7 @@ ssl23_accept(SSL *s)
152 cb(s, SSL_CB_HANDSHAKE_START, 1); 152 cb(s, SSL_CB_HANDSHAKE_START, 1);
153 153
154 /* s->version=SSL3_VERSION; */ 154 /* s->version=SSL3_VERSION; */
155 s->type = SSL_ST_ACCEPT; 155 s->internal->type = SSL_ST_ACCEPT;
156 156
157 if (!ssl3_setup_init_buffer(s)) { 157 if (!ssl3_setup_init_buffer(s)) {
158 ret = -1; 158 ret = -1;
@@ -165,13 +165,13 @@ ssl23_accept(SSL *s)
165 165
166 s->state = SSL23_ST_SR_CLNT_HELLO_A; 166 s->state = SSL23_ST_SR_CLNT_HELLO_A;
167 s->ctx->internal->stats.sess_accept++; 167 s->ctx->internal->stats.sess_accept++;
168 s->init_num = 0; 168 s->internal->init_num = 0;
169 break; 169 break;
170 170
171 case SSL23_ST_SR_CLNT_HELLO_A: 171 case SSL23_ST_SR_CLNT_HELLO_A:
172 case SSL23_ST_SR_CLNT_HELLO_B: 172 case SSL23_ST_SR_CLNT_HELLO_B:
173 173
174 s->shutdown = 0; 174 s->internal->shutdown = 0;
175 ret = ssl23_get_client_hello(s); 175 ret = ssl23_get_client_hello(s);
176 if (ret >= 0) 176 if (ret >= 0)
177 cb = NULL; 177 cb = NULL;
@@ -237,7 +237,7 @@ ssl23_get_client_hello(SSL *s)
237 if (n != sizeof buf) 237 if (n != sizeof buf)
238 return(n); 238 return(n);
239 239
240 p = s->packet; 240 p = s->internal->packet;
241 241
242 memcpy(buf, p, n); 242 memcpy(buf, p, n);
243 243
@@ -314,7 +314,7 @@ ssl23_get_client_hello(SSL *s)
314 goto unsupported; 314 goto unsupported;
315 315
316 type = 2; 316 type = 2;
317 p = s->packet; 317 p = s->internal->packet;
318 client_version = p[3] << 8 | p[4]; 318 client_version = p[3] << 8 | p[4];
319 319
320 /* An SSLv3/TLSv1 backwards-compatible CLIENT-HELLO in an SSLv2 320 /* An SSLv3/TLSv1 backwards-compatible CLIENT-HELLO in an SSLv2
@@ -344,18 +344,18 @@ ssl23_get_client_hello(SSL *s)
344 if (j != n + 2) 344 if (j != n + 2)
345 return -1; 345 return -1;
346 346
347 tls1_finish_mac(s, s->packet + 2, s->packet_length - 2); 347 tls1_finish_mac(s, s->internal->packet + 2, s->internal->packet_length - 2);
348 if (s->internal->msg_callback) 348 if (s->internal->msg_callback)
349 s->internal->msg_callback(0, SSL2_VERSION, 0, s->packet + 2, 349 s->internal->msg_callback(0, SSL2_VERSION, 0, s->internal->packet + 2,
350 s->packet_length - 2, s, s->internal->msg_callback_arg); 350 s->internal->packet_length - 2, s, s->internal->msg_callback_arg);
351 351
352 p = s->packet; 352 p = s->internal->packet;
353 p += 5; 353 p += 5;
354 n2s(p, csl); 354 n2s(p, csl);
355 n2s(p, sil); 355 n2s(p, sil);
356 n2s(p, cl); 356 n2s(p, cl);
357 d = (unsigned char *)s->init_buf->data; 357 d = (unsigned char *)s->internal->init_buf->data;
358 if ((csl + sil + cl + 11) != s->packet_length) { 358 if ((csl + sil + cl + 11) != s->internal->packet_length) {
359 /* 359 /*
360 * We can't have TLS extensions in SSL 2.0 format 360 * We can't have TLS extensions in SSL 2.0 format
361 * Client Hello, can we ? Error condition should be 361 * Client Hello, can we ? Error condition should be
@@ -403,7 +403,7 @@ ssl23_get_client_hello(SSL *s)
403 *(d++) = 1; 403 *(d++) = 1;
404 *(d++) = 0; 404 *(d++) = 0;
405 405
406 i = (d - (unsigned char *)s->init_buf->data) - 4; 406 i = (d - (unsigned char *)s->internal->init_buf->data) - 4;
407 l2n3((long)i, d_len); 407 l2n3((long)i, d_len);
408 408
409 /* get the data reused from the init_buf */ 409 /* get the data reused from the init_buf */
@@ -428,17 +428,17 @@ ssl23_get_client_hello(SSL *s)
428 /* put the 'n' bytes we have read into the input buffer 428 /* put the 'n' bytes we have read into the input buffer
429 * for SSLv3 */ 429 * for SSLv3 */
430 s->rstate = SSL_ST_READ_HEADER; 430 s->rstate = SSL_ST_READ_HEADER;
431 s->packet_length = n; 431 s->internal->packet_length = n;
432 if (s->s3->rbuf.buf == NULL) 432 if (s->s3->rbuf.buf == NULL)
433 if (!ssl3_setup_read_buffer(s)) 433 if (!ssl3_setup_read_buffer(s))
434 return -1; 434 return -1;
435 435
436 s->packet = &(s->s3->rbuf.buf[0]); 436 s->internal->packet = &(s->s3->rbuf.buf[0]);
437 memcpy(s->packet, buf, n); 437 memcpy(s->internal->packet, buf, n);
438 s->s3->rbuf.left = n; 438 s->s3->rbuf.left = n;
439 s->s3->rbuf.offset = 0; 439 s->s3->rbuf.offset = 0;
440 } else { 440 } else {
441 s->packet_length = 0; 441 s->internal->packet_length = 0;
442 s->s3->rbuf.left = 0; 442 s->s3->rbuf.left = 0;
443 s->s3->rbuf.offset = 0; 443 s->s3->rbuf.offset = 0;
444 } 444 }
@@ -456,7 +456,7 @@ ssl23_get_client_hello(SSL *s)
456 SSLerr(SSL_F_SSL23_GET_CLIENT_HELLO, SSL_R_UNKNOWN_PROTOCOL); 456 SSLerr(SSL_F_SSL23_GET_CLIENT_HELLO, SSL_R_UNKNOWN_PROTOCOL);
457 return -1; 457 return -1;
458 } 458 }
459 s->init_num = 0; 459 s->internal->init_num = 0;
460 460
461 return (SSL_accept(s)); 461 return (SSL_accept(s));
462 462