diff options
Diffstat (limited to 'src/lib/libssl/ssl_clnt.c')
| -rw-r--r-- | src/lib/libssl/ssl_clnt.c | 28 |
1 files changed, 14 insertions, 14 deletions
diff --git a/src/lib/libssl/ssl_clnt.c b/src/lib/libssl/ssl_clnt.c index 0f602bef7e..984ade0957 100644 --- a/src/lib/libssl/ssl_clnt.c +++ b/src/lib/libssl/ssl_clnt.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_clnt.c,v 1.87 2021/03/24 18:40:03 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_clnt.c,v 1.88 2021/03/24 18:44:00 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -343,7 +343,7 @@ ssl3_connect(SSL *s) | |||
| 343 | break; | 343 | break; |
| 344 | } | 344 | } |
| 345 | /* Check if it is anon DH/ECDH. */ | 345 | /* Check if it is anon DH/ECDH. */ |
| 346 | if (!(S3I(s)->hs.new_cipher->algorithm_auth & | 346 | if (!(S3I(s)->hs.cipher->algorithm_auth & |
| 347 | SSL_aNULL)) { | 347 | SSL_aNULL)) { |
| 348 | ret = ssl3_get_server_certificate(s); | 348 | ret = ssl3_get_server_certificate(s); |
| 349 | if (ret <= 0) | 349 | if (ret <= 0) |
| @@ -477,7 +477,7 @@ ssl3_connect(SSL *s) | |||
| 477 | S3I(s)->hs.state = SSL3_ST_CW_FINISHED_A; | 477 | S3I(s)->hs.state = SSL3_ST_CW_FINISHED_A; |
| 478 | s->internal->init_num = 0; | 478 | s->internal->init_num = 0; |
| 479 | 479 | ||
| 480 | s->session->cipher = S3I(s)->hs.new_cipher; | 480 | s->session->cipher = S3I(s)->hs.cipher; |
| 481 | if (!tls1_setup_key_block(s)) { | 481 | if (!tls1_setup_key_block(s)) { |
| 482 | ret = -1; | 482 | ret = -1; |
| 483 | goto end; | 483 | goto end; |
| @@ -1054,7 +1054,7 @@ ssl3_get_server_hello(SSL *s) | |||
| 1054 | SSLerror(s, SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED); | 1054 | SSLerror(s, SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED); |
| 1055 | goto fatal_err; | 1055 | goto fatal_err; |
| 1056 | } | 1056 | } |
| 1057 | S3I(s)->hs.new_cipher = cipher; | 1057 | S3I(s)->hs.cipher = cipher; |
| 1058 | 1058 | ||
| 1059 | if (!tls1_transcript_hash_init(s)) | 1059 | if (!tls1_transcript_hash_init(s)) |
| 1060 | goto err; | 1060 | goto err; |
| @@ -1063,7 +1063,7 @@ ssl3_get_server_hello(SSL *s) | |||
| 1063 | * Don't digest cached records if no sigalgs: we may need them for | 1063 | * Don't digest cached records if no sigalgs: we may need them for |
| 1064 | * client authentication. | 1064 | * client authentication. |
| 1065 | */ | 1065 | */ |
| 1066 | alg_k = S3I(s)->hs.new_cipher->algorithm_mkey; | 1066 | alg_k = S3I(s)->hs.cipher->algorithm_mkey; |
| 1067 | if (!(SSL_USE_SIGALGS(s) || (alg_k & SSL_kGOST))) | 1067 | if (!(SSL_USE_SIGALGS(s) || (alg_k & SSL_kGOST))) |
| 1068 | tls1_transcript_free(s); | 1068 | tls1_transcript_free(s); |
| 1069 | 1069 | ||
| @@ -1276,7 +1276,7 @@ ssl3_get_server_kex_dhe(SSL *s, EVP_PKEY **pkey, CBS *cbs) | |||
| 1276 | long alg_a; | 1276 | long alg_a; |
| 1277 | int al; | 1277 | int al; |
| 1278 | 1278 | ||
| 1279 | alg_a = S3I(s)->hs.new_cipher->algorithm_auth; | 1279 | alg_a = S3I(s)->hs.cipher->algorithm_auth; |
| 1280 | sc = SSI(s)->sess_cert; | 1280 | sc = SSI(s)->sess_cert; |
| 1281 | 1281 | ||
| 1282 | if ((dh = DH_new()) == NULL) { | 1282 | if ((dh = DH_new()) == NULL) { |
| @@ -1404,7 +1404,7 @@ ssl3_get_server_kex_ecdhe(SSL *s, EVP_PKEY **pkey, CBS *cbs) | |||
| 1404 | int nid; | 1404 | int nid; |
| 1405 | int al; | 1405 | int al; |
| 1406 | 1406 | ||
| 1407 | alg_a = S3I(s)->hs.new_cipher->algorithm_auth; | 1407 | alg_a = S3I(s)->hs.cipher->algorithm_auth; |
| 1408 | sc = SSI(s)->sess_cert; | 1408 | sc = SSI(s)->sess_cert; |
| 1409 | 1409 | ||
| 1410 | /* Only named curves are supported. */ | 1410 | /* Only named curves are supported. */ |
| @@ -1483,8 +1483,8 @@ ssl3_get_server_key_exchange(SSL *s) | |||
| 1483 | 1483 | ||
| 1484 | EVP_MD_CTX_init(&md_ctx); | 1484 | EVP_MD_CTX_init(&md_ctx); |
| 1485 | 1485 | ||
| 1486 | alg_k = S3I(s)->hs.new_cipher->algorithm_mkey; | 1486 | alg_k = S3I(s)->hs.cipher->algorithm_mkey; |
| 1487 | alg_a = S3I(s)->hs.new_cipher->algorithm_auth; | 1487 | alg_a = S3I(s)->hs.cipher->algorithm_auth; |
| 1488 | 1488 | ||
| 1489 | /* | 1489 | /* |
| 1490 | * Use same message size as in ssl3_get_certificate_request() | 1490 | * Use same message size as in ssl3_get_certificate_request() |
| @@ -1682,7 +1682,7 @@ ssl3_get_certificate_request(SSL *s) | |||
| 1682 | } | 1682 | } |
| 1683 | 1683 | ||
| 1684 | /* TLS does not like anon-DH with client cert */ | 1684 | /* TLS does not like anon-DH with client cert */ |
| 1685 | if (S3I(s)->hs.new_cipher->algorithm_auth & SSL_aNULL) { | 1685 | if (S3I(s)->hs.cipher->algorithm_auth & SSL_aNULL) { |
| 1686 | ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_UNEXPECTED_MESSAGE); | 1686 | ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_UNEXPECTED_MESSAGE); |
| 1687 | SSLerror(s, SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER); | 1687 | SSLerror(s, SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER); |
| 1688 | goto err; | 1688 | goto err; |
| @@ -2251,7 +2251,7 @@ ssl3_send_client_kex_gost(SSL *s, SESS_CERT *sess_cert, CBB *cbb) | |||
| 2251 | } | 2251 | } |
| 2252 | 2252 | ||
| 2253 | /* XXX check handshake hash instead. */ | 2253 | /* XXX check handshake hash instead. */ |
| 2254 | if (S3I(s)->hs.new_cipher->algorithm2 & SSL_HANDSHAKE_MAC_GOST94) | 2254 | if (S3I(s)->hs.cipher->algorithm2 & SSL_HANDSHAKE_MAC_GOST94) |
| 2255 | nid = NID_id_GostR3411_94; | 2255 | nid = NID_id_GostR3411_94; |
| 2256 | else | 2256 | else |
| 2257 | nid = NID_id_tc26_gost3411_2012_256; | 2257 | nid = NID_id_tc26_gost3411_2012_256; |
| @@ -2314,7 +2314,7 @@ ssl3_send_client_key_exchange(SSL *s) | |||
| 2314 | memset(&cbb, 0, sizeof(cbb)); | 2314 | memset(&cbb, 0, sizeof(cbb)); |
| 2315 | 2315 | ||
| 2316 | if (S3I(s)->hs.state == SSL3_ST_CW_KEY_EXCH_A) { | 2316 | if (S3I(s)->hs.state == SSL3_ST_CW_KEY_EXCH_A) { |
| 2317 | alg_k = S3I(s)->hs.new_cipher->algorithm_mkey; | 2317 | alg_k = S3I(s)->hs.cipher->algorithm_mkey; |
| 2318 | 2318 | ||
| 2319 | if ((sess_cert = SSI(s)->sess_cert) == NULL) { | 2319 | if ((sess_cert = SSI(s)->sess_cert) == NULL) { |
| 2320 | ssl3_send_alert(s, SSL3_AL_FATAL, | 2320 | ssl3_send_alert(s, SSL3_AL_FATAL, |
| @@ -2726,8 +2726,8 @@ ssl3_check_cert_and_algorithm(SSL *s) | |||
| 2726 | SESS_CERT *sc; | 2726 | SESS_CERT *sc; |
| 2727 | DH *dh; | 2727 | DH *dh; |
| 2728 | 2728 | ||
| 2729 | alg_k = S3I(s)->hs.new_cipher->algorithm_mkey; | 2729 | alg_k = S3I(s)->hs.cipher->algorithm_mkey; |
| 2730 | alg_a = S3I(s)->hs.new_cipher->algorithm_auth; | 2730 | alg_a = S3I(s)->hs.cipher->algorithm_auth; |
| 2731 | 2731 | ||
| 2732 | /* We don't have a certificate. */ | 2732 | /* We don't have a certificate. */ |
| 2733 | if (alg_a & SSL_aNULL) | 2733 | if (alg_a & SSL_aNULL) |
