diff options
Diffstat (limited to 'src/lib/libssl/s23_srvr.c')
-rw-r--r-- | src/lib/libssl/s23_srvr.c | 36 |
1 files changed, 18 insertions, 18 deletions
diff --git a/src/lib/libssl/s23_srvr.c b/src/lib/libssl/s23_srvr.c index 79c2eee521..6b5ac0cc63 100644 --- a/src/lib/libssl/s23_srvr.c +++ b/src/lib/libssl/s23_srvr.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s23_srvr.c,v 1.53 2017/01/23 04:55:26 beck Exp $ */ | 1 | /* $OpenBSD: s23_srvr.c,v 1.54 2017/01/23 06:45:30 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -152,7 +152,7 @@ ssl23_accept(SSL *s) | |||
152 | cb(s, SSL_CB_HANDSHAKE_START, 1); | 152 | cb(s, SSL_CB_HANDSHAKE_START, 1); |
153 | 153 | ||
154 | /* s->version=SSL3_VERSION; */ | 154 | /* s->version=SSL3_VERSION; */ |
155 | s->type = SSL_ST_ACCEPT; | 155 | s->internal->type = SSL_ST_ACCEPT; |
156 | 156 | ||
157 | if (!ssl3_setup_init_buffer(s)) { | 157 | if (!ssl3_setup_init_buffer(s)) { |
158 | ret = -1; | 158 | ret = -1; |
@@ -165,13 +165,13 @@ ssl23_accept(SSL *s) | |||
165 | 165 | ||
166 | s->state = SSL23_ST_SR_CLNT_HELLO_A; | 166 | s->state = SSL23_ST_SR_CLNT_HELLO_A; |
167 | s->ctx->internal->stats.sess_accept++; | 167 | s->ctx->internal->stats.sess_accept++; |
168 | s->init_num = 0; | 168 | s->internal->init_num = 0; |
169 | break; | 169 | break; |
170 | 170 | ||
171 | case SSL23_ST_SR_CLNT_HELLO_A: | 171 | case SSL23_ST_SR_CLNT_HELLO_A: |
172 | case SSL23_ST_SR_CLNT_HELLO_B: | 172 | case SSL23_ST_SR_CLNT_HELLO_B: |
173 | 173 | ||
174 | s->shutdown = 0; | 174 | s->internal->shutdown = 0; |
175 | ret = ssl23_get_client_hello(s); | 175 | ret = ssl23_get_client_hello(s); |
176 | if (ret >= 0) | 176 | if (ret >= 0) |
177 | cb = NULL; | 177 | cb = NULL; |
@@ -237,7 +237,7 @@ ssl23_get_client_hello(SSL *s) | |||
237 | if (n != sizeof buf) | 237 | if (n != sizeof buf) |
238 | return(n); | 238 | return(n); |
239 | 239 | ||
240 | p = s->packet; | 240 | p = s->internal->packet; |
241 | 241 | ||
242 | memcpy(buf, p, n); | 242 | memcpy(buf, p, n); |
243 | 243 | ||
@@ -314,7 +314,7 @@ ssl23_get_client_hello(SSL *s) | |||
314 | goto unsupported; | 314 | goto unsupported; |
315 | 315 | ||
316 | type = 2; | 316 | type = 2; |
317 | p = s->packet; | 317 | p = s->internal->packet; |
318 | client_version = p[3] << 8 | p[4]; | 318 | client_version = p[3] << 8 | p[4]; |
319 | 319 | ||
320 | /* An SSLv3/TLSv1 backwards-compatible CLIENT-HELLO in an SSLv2 | 320 | /* An SSLv3/TLSv1 backwards-compatible CLIENT-HELLO in an SSLv2 |
@@ -344,18 +344,18 @@ ssl23_get_client_hello(SSL *s) | |||
344 | if (j != n + 2) | 344 | if (j != n + 2) |
345 | return -1; | 345 | return -1; |
346 | 346 | ||
347 | tls1_finish_mac(s, s->packet + 2, s->packet_length - 2); | 347 | tls1_finish_mac(s, s->internal->packet + 2, s->internal->packet_length - 2); |
348 | if (s->internal->msg_callback) | 348 | if (s->internal->msg_callback) |
349 | s->internal->msg_callback(0, SSL2_VERSION, 0, s->packet + 2, | 349 | s->internal->msg_callback(0, SSL2_VERSION, 0, s->internal->packet + 2, |
350 | s->packet_length - 2, s, s->internal->msg_callback_arg); | 350 | s->internal->packet_length - 2, s, s->internal->msg_callback_arg); |
351 | 351 | ||
352 | p = s->packet; | 352 | p = s->internal->packet; |
353 | p += 5; | 353 | p += 5; |
354 | n2s(p, csl); | 354 | n2s(p, csl); |
355 | n2s(p, sil); | 355 | n2s(p, sil); |
356 | n2s(p, cl); | 356 | n2s(p, cl); |
357 | d = (unsigned char *)s->init_buf->data; | 357 | d = (unsigned char *)s->internal->init_buf->data; |
358 | if ((csl + sil + cl + 11) != s->packet_length) { | 358 | if ((csl + sil + cl + 11) != s->internal->packet_length) { |
359 | /* | 359 | /* |
360 | * We can't have TLS extensions in SSL 2.0 format | 360 | * We can't have TLS extensions in SSL 2.0 format |
361 | * Client Hello, can we ? Error condition should be | 361 | * Client Hello, can we ? Error condition should be |
@@ -403,7 +403,7 @@ ssl23_get_client_hello(SSL *s) | |||
403 | *(d++) = 1; | 403 | *(d++) = 1; |
404 | *(d++) = 0; | 404 | *(d++) = 0; |
405 | 405 | ||
406 | i = (d - (unsigned char *)s->init_buf->data) - 4; | 406 | i = (d - (unsigned char *)s->internal->init_buf->data) - 4; |
407 | l2n3((long)i, d_len); | 407 | l2n3((long)i, d_len); |
408 | 408 | ||
409 | /* get the data reused from the init_buf */ | 409 | /* get the data reused from the init_buf */ |
@@ -428,17 +428,17 @@ ssl23_get_client_hello(SSL *s) | |||
428 | /* put the 'n' bytes we have read into the input buffer | 428 | /* put the 'n' bytes we have read into the input buffer |
429 | * for SSLv3 */ | 429 | * for SSLv3 */ |
430 | s->rstate = SSL_ST_READ_HEADER; | 430 | s->rstate = SSL_ST_READ_HEADER; |
431 | s->packet_length = n; | 431 | s->internal->packet_length = n; |
432 | if (s->s3->rbuf.buf == NULL) | 432 | if (s->s3->rbuf.buf == NULL) |
433 | if (!ssl3_setup_read_buffer(s)) | 433 | if (!ssl3_setup_read_buffer(s)) |
434 | return -1; | 434 | return -1; |
435 | 435 | ||
436 | s->packet = &(s->s3->rbuf.buf[0]); | 436 | s->internal->packet = &(s->s3->rbuf.buf[0]); |
437 | memcpy(s->packet, buf, n); | 437 | memcpy(s->internal->packet, buf, n); |
438 | s->s3->rbuf.left = n; | 438 | s->s3->rbuf.left = n; |
439 | s->s3->rbuf.offset = 0; | 439 | s->s3->rbuf.offset = 0; |
440 | } else { | 440 | } else { |
441 | s->packet_length = 0; | 441 | s->internal->packet_length = 0; |
442 | s->s3->rbuf.left = 0; | 442 | s->s3->rbuf.left = 0; |
443 | s->s3->rbuf.offset = 0; | 443 | s->s3->rbuf.offset = 0; |
444 | } | 444 | } |
@@ -456,7 +456,7 @@ ssl23_get_client_hello(SSL *s) | |||
456 | SSLerr(SSL_F_SSL23_GET_CLIENT_HELLO, SSL_R_UNKNOWN_PROTOCOL); | 456 | SSLerr(SSL_F_SSL23_GET_CLIENT_HELLO, SSL_R_UNKNOWN_PROTOCOL); |
457 | return -1; | 457 | return -1; |
458 | } | 458 | } |
459 | s->init_num = 0; | 459 | s->internal->init_num = 0; |
460 | 460 | ||
461 | return (SSL_accept(s)); | 461 | return (SSL_accept(s)); |
462 | 462 | ||