diff options
Diffstat (limited to 'src/lib/libssl/s3_both.c')
| -rw-r--r-- | src/lib/libssl/s3_both.c | 24 |
1 files changed, 12 insertions, 12 deletions
diff --git a/src/lib/libssl/s3_both.c b/src/lib/libssl/s3_both.c index 23fdcd2065..7490a183fb 100644 --- a/src/lib/libssl/s3_both.c +++ b/src/lib/libssl/s3_both.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s3_both.c,v 1.54 2017/01/23 08:48:44 beck Exp $ */ | 1 | /* $OpenBSD: s3_both.c,v 1.55 2017/01/23 13:36:13 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -170,10 +170,10 @@ ssl3_send_finished(SSL *s, int a, int b, const char *sender, int slen) | |||
| 170 | int md_len; | 170 | int md_len; |
| 171 | 171 | ||
| 172 | if (s->internal->state == a) { | 172 | if (s->internal->state == a) { |
| 173 | md_len = s->method->ssl3_enc->finish_mac_length; | 173 | md_len = s->method->internal->ssl3_enc->finish_mac_length; |
| 174 | OPENSSL_assert(md_len <= EVP_MAX_MD_SIZE); | 174 | OPENSSL_assert(md_len <= EVP_MAX_MD_SIZE); |
| 175 | 175 | ||
| 176 | if (s->method->ssl3_enc->final_finish_mac(s, sender, slen, | 176 | if (s->method->internal->ssl3_enc->final_finish_mac(s, sender, slen, |
| 177 | S3I(s)->tmp.finish_md) != md_len) | 177 | S3I(s)->tmp.finish_md) != md_len) |
| 178 | return (0); | 178 | return (0); |
| 179 | S3I(s)->tmp.finish_md_len = md_len; | 179 | S3I(s)->tmp.finish_md_len = md_len; |
| @@ -217,15 +217,15 @@ ssl3_take_mac(SSL *s) | |||
| 217 | return; | 217 | return; |
| 218 | 218 | ||
| 219 | if (s->internal->state & SSL_ST_CONNECT) { | 219 | if (s->internal->state & SSL_ST_CONNECT) { |
| 220 | sender = s->method->ssl3_enc->server_finished_label; | 220 | sender = s->method->internal->ssl3_enc->server_finished_label; |
| 221 | slen = s->method->ssl3_enc->server_finished_label_len; | 221 | slen = s->method->internal->ssl3_enc->server_finished_label_len; |
| 222 | } else { | 222 | } else { |
| 223 | sender = s->method->ssl3_enc->client_finished_label; | 223 | sender = s->method->internal->ssl3_enc->client_finished_label; |
| 224 | slen = s->method->ssl3_enc->client_finished_label_len; | 224 | slen = s->method->internal->ssl3_enc->client_finished_label_len; |
| 225 | } | 225 | } |
| 226 | 226 | ||
| 227 | S3I(s)->tmp.peer_finish_md_len = | 227 | S3I(s)->tmp.peer_finish_md_len = |
| 228 | s->method->ssl3_enc->final_finish_mac(s, sender, slen, | 228 | s->method->internal->ssl3_enc->final_finish_mac(s, sender, slen, |
| 229 | S3I(s)->tmp.peer_finish_md); | 229 | S3I(s)->tmp.peer_finish_md); |
| 230 | } | 230 | } |
| 231 | 231 | ||
| @@ -237,7 +237,7 @@ ssl3_get_finished(SSL *s, int a, int b) | |||
| 237 | CBS cbs; | 237 | CBS cbs; |
| 238 | 238 | ||
| 239 | /* should actually be 36+4 :-) */ | 239 | /* should actually be 36+4 :-) */ |
| 240 | n = s->method->ssl_get_message(s, a, b, SSL3_MT_FINISHED, 64, &ok); | 240 | n = s->method->internal->ssl_get_message(s, a, b, SSL3_MT_FINISHED, 64, &ok); |
| 241 | if (!ok) | 241 | if (!ok) |
| 242 | return ((int)n); | 242 | return ((int)n); |
| 243 | 243 | ||
| @@ -249,7 +249,7 @@ ssl3_get_finished(SSL *s, int a, int b) | |||
| 249 | } | 249 | } |
| 250 | S3I(s)->change_cipher_spec = 0; | 250 | S3I(s)->change_cipher_spec = 0; |
| 251 | 251 | ||
| 252 | md_len = s->method->ssl3_enc->finish_mac_length; | 252 | md_len = s->method->internal->ssl3_enc->finish_mac_length; |
| 253 | 253 | ||
| 254 | if (n < 0) { | 254 | if (n < 0) { |
| 255 | al = SSL_AD_DECODE_ERROR; | 255 | al = SSL_AD_DECODE_ERROR; |
| @@ -438,7 +438,7 @@ ssl3_get_message(SSL *s, int st1, int stn, int mt, long max, int *ok) | |||
| 438 | 438 | ||
| 439 | do { | 439 | do { |
| 440 | while (s->internal->init_num < 4) { | 440 | while (s->internal->init_num < 4) { |
| 441 | i = s->method->ssl_read_bytes(s, | 441 | i = s->method->internal->ssl_read_bytes(s, |
| 442 | SSL3_RT_HANDSHAKE, &p[s->internal->init_num], | 442 | SSL3_RT_HANDSHAKE, &p[s->internal->init_num], |
| 443 | 4 - s->internal->init_num, 0); | 443 | 4 - s->internal->init_num, 0); |
| 444 | if (i <= 0) { | 444 | if (i <= 0) { |
| @@ -507,7 +507,7 @@ ssl3_get_message(SSL *s, int st1, int stn, int mt, long max, int *ok) | |||
| 507 | p = s->internal->init_msg; | 507 | p = s->internal->init_msg; |
| 508 | n = S3I(s)->tmp.message_size - s->internal->init_num; | 508 | n = S3I(s)->tmp.message_size - s->internal->init_num; |
| 509 | while (n > 0) { | 509 | while (n > 0) { |
| 510 | i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, | 510 | i = s->method->internal->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, |
| 511 | &p[s->internal->init_num], n, 0); | 511 | &p[s->internal->init_num], n, 0); |
| 512 | if (i <= 0) { | 512 | if (i <= 0) { |
| 513 | s->internal->rwstate = SSL_READING; | 513 | s->internal->rwstate = SSL_READING; |
