diff options
Diffstat (limited to 'src/lib/libssl/ssl_cert.c')
-rw-r--r-- | src/lib/libssl/ssl_cert.c | 38 |
1 files changed, 19 insertions, 19 deletions
diff --git a/src/lib/libssl/ssl_cert.c b/src/lib/libssl/ssl_cert.c index 453d75771d..d102e2e29d 100644 --- a/src/lib/libssl/ssl_cert.c +++ b/src/lib/libssl/ssl_cert.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_cert.c,v 1.103 2022/07/07 13:04:39 tb Exp $ */ | 1 | /* $OpenBSD: ssl_cert.c,v 1.104 2022/10/02 16:36:41 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -304,7 +304,7 @@ ssl_get0_cert(SSL_CTX *ctx, SSL *ssl) | |||
304 | if (ssl != NULL) | 304 | if (ssl != NULL) |
305 | return ssl->cert; | 305 | return ssl->cert; |
306 | 306 | ||
307 | return ctx->internal->cert; | 307 | return ctx->cert; |
308 | } | 308 | } |
309 | 309 | ||
310 | int | 310 | int |
@@ -430,21 +430,21 @@ ssl_verify_cert_chain(SSL *s, STACK_OF(X509) *certs) | |||
430 | */ | 430 | */ |
431 | X509_VERIFY_PARAM_set1(param, s->param); | 431 | X509_VERIFY_PARAM_set1(param, s->param); |
432 | 432 | ||
433 | if (s->internal->verify_callback) | 433 | if (s->verify_callback) |
434 | X509_STORE_CTX_set_verify_cb(ctx, s->internal->verify_callback); | 434 | X509_STORE_CTX_set_verify_cb(ctx, s->verify_callback); |
435 | 435 | ||
436 | if (s->ctx->internal->app_verify_callback != NULL) | 436 | if (s->ctx->app_verify_callback != NULL) |
437 | ret = s->ctx->internal->app_verify_callback(ctx, | 437 | ret = s->ctx->app_verify_callback(ctx, |
438 | s->ctx->internal->app_verify_arg); | 438 | s->ctx->app_verify_arg); |
439 | else | 439 | else |
440 | ret = X509_verify_cert(ctx); | 440 | ret = X509_verify_cert(ctx); |
441 | 441 | ||
442 | s->verify_result = X509_STORE_CTX_get_error(ctx); | 442 | s->verify_result = X509_STORE_CTX_get_error(ctx); |
443 | sk_X509_pop_free(s->internal->verified_chain, X509_free); | 443 | sk_X509_pop_free(s->verified_chain, X509_free); |
444 | s->internal->verified_chain = NULL; | 444 | s->verified_chain = NULL; |
445 | if (X509_STORE_CTX_get0_chain(ctx) != NULL) { | 445 | if (X509_STORE_CTX_get0_chain(ctx) != NULL) { |
446 | s->internal->verified_chain = X509_STORE_CTX_get1_chain(ctx); | 446 | s->verified_chain = X509_STORE_CTX_get1_chain(ctx); |
447 | if (s->internal->verified_chain == NULL) { | 447 | if (s->verified_chain == NULL) { |
448 | SSLerrorx(ERR_R_MALLOC_FAILURE); | 448 | SSLerrorx(ERR_R_MALLOC_FAILURE); |
449 | ret = 0; | 449 | ret = 0; |
450 | } | 450 | } |
@@ -491,19 +491,19 @@ SSL_dup_CA_list(const STACK_OF(X509_NAME) *sk) | |||
491 | void | 491 | void |
492 | SSL_set_client_CA_list(SSL *s, STACK_OF(X509_NAME) *name_list) | 492 | SSL_set_client_CA_list(SSL *s, STACK_OF(X509_NAME) *name_list) |
493 | { | 493 | { |
494 | set_client_CA_list(&(s->internal->client_CA), name_list); | 494 | set_client_CA_list(&(s->client_CA), name_list); |
495 | } | 495 | } |
496 | 496 | ||
497 | void | 497 | void |
498 | SSL_CTX_set_client_CA_list(SSL_CTX *ctx, STACK_OF(X509_NAME) *name_list) | 498 | SSL_CTX_set_client_CA_list(SSL_CTX *ctx, STACK_OF(X509_NAME) *name_list) |
499 | { | 499 | { |
500 | set_client_CA_list(&(ctx->internal->client_CA), name_list); | 500 | set_client_CA_list(&(ctx->client_CA), name_list); |
501 | } | 501 | } |
502 | 502 | ||
503 | STACK_OF(X509_NAME) * | 503 | STACK_OF(X509_NAME) * |
504 | SSL_CTX_get_client_CA_list(const SSL_CTX *ctx) | 504 | SSL_CTX_get_client_CA_list(const SSL_CTX *ctx) |
505 | { | 505 | { |
506 | return (ctx->internal->client_CA); | 506 | return (ctx->client_CA); |
507 | } | 507 | } |
508 | 508 | ||
509 | STACK_OF(X509_NAME) * | 509 | STACK_OF(X509_NAME) * |
@@ -516,10 +516,10 @@ SSL_get_client_CA_list(const SSL *s) | |||
516 | else | 516 | else |
517 | return (NULL); | 517 | return (NULL); |
518 | } else { | 518 | } else { |
519 | if (s->internal->client_CA != NULL) | 519 | if (s->client_CA != NULL) |
520 | return (s->internal->client_CA); | 520 | return (s->client_CA); |
521 | else | 521 | else |
522 | return (s->ctx->internal->client_CA); | 522 | return (s->ctx->client_CA); |
523 | } | 523 | } |
524 | } | 524 | } |
525 | 525 | ||
@@ -546,13 +546,13 @@ add_client_CA(STACK_OF(X509_NAME) **sk, X509 *x) | |||
546 | int | 546 | int |
547 | SSL_add_client_CA(SSL *ssl, X509 *x) | 547 | SSL_add_client_CA(SSL *ssl, X509 *x) |
548 | { | 548 | { |
549 | return (add_client_CA(&(ssl->internal->client_CA), x)); | 549 | return (add_client_CA(&(ssl->client_CA), x)); |
550 | } | 550 | } |
551 | 551 | ||
552 | int | 552 | int |
553 | SSL_CTX_add_client_CA(SSL_CTX *ctx, X509 *x) | 553 | SSL_CTX_add_client_CA(SSL_CTX *ctx, X509 *x) |
554 | { | 554 | { |
555 | return (add_client_CA(&(ctx->internal->client_CA), x)); | 555 | return (add_client_CA(&(ctx->client_CA), x)); |
556 | } | 556 | } |
557 | 557 | ||
558 | static int | 558 | static int |