diff options
Diffstat (limited to 'src/lib/libssl/s3_lib.c')
| -rw-r--r-- | src/lib/libssl/s3_lib.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c index 92f4c49aa8..8e52c8bb4a 100644 --- a/src/lib/libssl/s3_lib.c +++ b/src/lib/libssl/s3_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s3_lib.c,v 1.122 2017/01/23 04:15:28 jsing Exp $ */ | 1 | /* $OpenBSD: s3_lib.c,v 1.123 2017/01/23 04:55:26 beck Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -2102,7 +2102,7 @@ ssl3_ctrl(SSL *s, int cmd, long larg, void *parg) | |||
| 2102 | } | 2102 | } |
| 2103 | break; | 2103 | break; |
| 2104 | case SSL_CTRL_SET_TLSEXT_DEBUG_ARG: | 2104 | case SSL_CTRL_SET_TLSEXT_DEBUG_ARG: |
| 2105 | s->tlsext_debug_arg = parg; | 2105 | s->internal->tlsext_debug_arg = parg; |
| 2106 | ret = 1; | 2106 | ret = 1; |
| 2107 | break; | 2107 | break; |
| 2108 | 2108 | ||
| @@ -2181,7 +2181,7 @@ ssl3_callback_ctrl(SSL *s, int cmd, void (*fp)(void)) | |||
| 2181 | s->cert->ecdh_tmp_cb = (EC_KEY *(*)(SSL *, int, int))fp; | 2181 | s->cert->ecdh_tmp_cb = (EC_KEY *(*)(SSL *, int, int))fp; |
| 2182 | break; | 2182 | break; |
| 2183 | case SSL_CTRL_SET_TLSEXT_DEBUG_CB: | 2183 | case SSL_CTRL_SET_TLSEXT_DEBUG_CB: |
| 2184 | s->tlsext_debug_cb = (void (*)(SSL *, int , int, | 2184 | s->internal->tlsext_debug_cb = (void (*)(SSL *, int , int, |
| 2185 | unsigned char *, int, void *))fp; | 2185 | unsigned char *, int, void *))fp; |
| 2186 | break; | 2186 | break; |
| 2187 | default: | 2187 | default: |
| @@ -2614,16 +2614,16 @@ ssl3_read_internal(SSL *s, void *buf, int len, int peek) | |||
| 2614 | SSL3_RT_APPLICATION_DATA, buf, len, peek); | 2614 | SSL3_RT_APPLICATION_DATA, buf, len, peek); |
| 2615 | if ((ret == -1) && (S3I(s)->in_read_app_data == 2)) { | 2615 | if ((ret == -1) && (S3I(s)->in_read_app_data == 2)) { |
| 2616 | /* | 2616 | /* |
| 2617 | * ssl3_read_bytes decided to call s->handshake_func, which | 2617 | * ssl3_read_bytes decided to call s->internal->handshake_func, which |
| 2618 | * called ssl3_read_bytes to read handshake data. | 2618 | * called ssl3_read_bytes to read handshake data. |
| 2619 | * However, ssl3_read_bytes actually found application data | 2619 | * However, ssl3_read_bytes actually found application data |
| 2620 | * and thinks that application data makes sense here; so disable | 2620 | * and thinks that application data makes sense here; so disable |
| 2621 | * handshake processing and try to read application data again. | 2621 | * handshake processing and try to read application data again. |
| 2622 | */ | 2622 | */ |
| 2623 | s->in_handshake++; | 2623 | s->internal->in_handshake++; |
| 2624 | ret = s->method->ssl_read_bytes(s, | 2624 | ret = s->method->ssl_read_bytes(s, |
| 2625 | SSL3_RT_APPLICATION_DATA, buf, len, peek); | 2625 | SSL3_RT_APPLICATION_DATA, buf, len, peek); |
| 2626 | s->in_handshake--; | 2626 | s->internal->in_handshake--; |
| 2627 | } else | 2627 | } else |
| 2628 | S3I(s)->in_read_app_data = 0; | 2628 | S3I(s)->in_read_app_data = 0; |
| 2629 | 2629 | ||
| @@ -2645,7 +2645,7 @@ ssl3_peek(SSL *s, void *buf, int len) | |||
| 2645 | int | 2645 | int |
| 2646 | ssl3_renegotiate(SSL *s) | 2646 | ssl3_renegotiate(SSL *s) |
| 2647 | { | 2647 | { |
| 2648 | if (s->handshake_func == NULL) | 2648 | if (s->internal->handshake_func == NULL) |
| 2649 | return (1); | 2649 | return (1); |
| 2650 | 2650 | ||
| 2651 | if (s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS) | 2651 | if (s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS) |
