diff options
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libssl/s3_both.c | 24 | 
1 files changed, 12 insertions, 12 deletions
| diff --git a/src/lib/libssl/s3_both.c b/src/lib/libssl/s3_both.c index 23fdcd2065..7490a183fb 100644 --- a/src/lib/libssl/s3_both.c +++ b/src/lib/libssl/s3_both.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s3_both.c,v 1.54 2017/01/23 08:48:44 beck Exp $ */ | 1 | /* $OpenBSD: s3_both.c,v 1.55 2017/01/23 13:36:13 jsing Exp $ */ | 
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 
| 3 | * All rights reserved. | 3 | * All rights reserved. | 
| 4 | * | 4 | * | 
| @@ -170,10 +170,10 @@ ssl3_send_finished(SSL *s, int a, int b, const char *sender, int slen) | |||
| 170 | int md_len; | 170 | int md_len; | 
| 171 | 171 | ||
| 172 | if (s->internal->state == a) { | 172 | if (s->internal->state == a) { | 
| 173 | md_len = s->method->ssl3_enc->finish_mac_length; | 173 | md_len = s->method->internal->ssl3_enc->finish_mac_length; | 
| 174 | OPENSSL_assert(md_len <= EVP_MAX_MD_SIZE); | 174 | OPENSSL_assert(md_len <= EVP_MAX_MD_SIZE); | 
| 175 | 175 | ||
| 176 | if (s->method->ssl3_enc->final_finish_mac(s, sender, slen, | 176 | if (s->method->internal->ssl3_enc->final_finish_mac(s, sender, slen, | 
| 177 | S3I(s)->tmp.finish_md) != md_len) | 177 | S3I(s)->tmp.finish_md) != md_len) | 
| 178 | return (0); | 178 | return (0); | 
| 179 | S3I(s)->tmp.finish_md_len = md_len; | 179 | S3I(s)->tmp.finish_md_len = md_len; | 
| @@ -217,15 +217,15 @@ ssl3_take_mac(SSL *s) | |||
| 217 | return; | 217 | return; | 
| 218 | 218 | ||
| 219 | if (s->internal->state & SSL_ST_CONNECT) { | 219 | if (s->internal->state & SSL_ST_CONNECT) { | 
| 220 | sender = s->method->ssl3_enc->server_finished_label; | 220 | sender = s->method->internal->ssl3_enc->server_finished_label; | 
| 221 | slen = s->method->ssl3_enc->server_finished_label_len; | 221 | slen = s->method->internal->ssl3_enc->server_finished_label_len; | 
| 222 | } else { | 222 | } else { | 
| 223 | sender = s->method->ssl3_enc->client_finished_label; | 223 | sender = s->method->internal->ssl3_enc->client_finished_label; | 
| 224 | slen = s->method->ssl3_enc->client_finished_label_len; | 224 | slen = s->method->internal->ssl3_enc->client_finished_label_len; | 
| 225 | } | 225 | } | 
| 226 | 226 | ||
| 227 | S3I(s)->tmp.peer_finish_md_len = | 227 | S3I(s)->tmp.peer_finish_md_len = | 
| 228 | s->method->ssl3_enc->final_finish_mac(s, sender, slen, | 228 | s->method->internal->ssl3_enc->final_finish_mac(s, sender, slen, | 
| 229 | S3I(s)->tmp.peer_finish_md); | 229 | S3I(s)->tmp.peer_finish_md); | 
| 230 | } | 230 | } | 
| 231 | 231 | ||
| @@ -237,7 +237,7 @@ ssl3_get_finished(SSL *s, int a, int b) | |||
| 237 | CBS cbs; | 237 | CBS cbs; | 
| 238 | 238 | ||
| 239 | /* should actually be 36+4 :-) */ | 239 | /* should actually be 36+4 :-) */ | 
| 240 | n = s->method->ssl_get_message(s, a, b, SSL3_MT_FINISHED, 64, &ok); | 240 | n = s->method->internal->ssl_get_message(s, a, b, SSL3_MT_FINISHED, 64, &ok); | 
| 241 | if (!ok) | 241 | if (!ok) | 
| 242 | return ((int)n); | 242 | return ((int)n); | 
| 243 | 243 | ||
| @@ -249,7 +249,7 @@ ssl3_get_finished(SSL *s, int a, int b) | |||
| 249 | } | 249 | } | 
| 250 | S3I(s)->change_cipher_spec = 0; | 250 | S3I(s)->change_cipher_spec = 0; | 
| 251 | 251 | ||
| 252 | md_len = s->method->ssl3_enc->finish_mac_length; | 252 | md_len = s->method->internal->ssl3_enc->finish_mac_length; | 
| 253 | 253 | ||
| 254 | if (n < 0) { | 254 | if (n < 0) { | 
| 255 | al = SSL_AD_DECODE_ERROR; | 255 | al = SSL_AD_DECODE_ERROR; | 
| @@ -438,7 +438,7 @@ ssl3_get_message(SSL *s, int st1, int stn, int mt, long max, int *ok) | |||
| 438 | 438 | ||
| 439 | do { | 439 | do { | 
| 440 | while (s->internal->init_num < 4) { | 440 | while (s->internal->init_num < 4) { | 
| 441 | i = s->method->ssl_read_bytes(s, | 441 | i = s->method->internal->ssl_read_bytes(s, | 
| 442 | SSL3_RT_HANDSHAKE, &p[s->internal->init_num], | 442 | SSL3_RT_HANDSHAKE, &p[s->internal->init_num], | 
| 443 | 4 - s->internal->init_num, 0); | 443 | 4 - s->internal->init_num, 0); | 
| 444 | if (i <= 0) { | 444 | if (i <= 0) { | 
| @@ -507,7 +507,7 @@ ssl3_get_message(SSL *s, int st1, int stn, int mt, long max, int *ok) | |||
| 507 | p = s->internal->init_msg; | 507 | p = s->internal->init_msg; | 
| 508 | n = S3I(s)->tmp.message_size - s->internal->init_num; | 508 | n = S3I(s)->tmp.message_size - s->internal->init_num; | 
| 509 | while (n > 0) { | 509 | while (n > 0) { | 
| 510 | i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, | 510 | i = s->method->internal->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, | 
| 511 | &p[s->internal->init_num], n, 0); | 511 | &p[s->internal->init_num], n, 0); | 
| 512 | if (i <= 0) { | 512 | if (i <= 0) { | 
| 513 | s->internal->rwstate = SSL_READING; | 513 | s->internal->rwstate = SSL_READING; | 
