summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_clnt.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/ssl_clnt.c')
-rw-r--r--src/lib/libssl/ssl_clnt.c36
1 files changed, 18 insertions, 18 deletions
diff --git a/src/lib/libssl/ssl_clnt.c b/src/lib/libssl/ssl_clnt.c
index 8a4c54e7b7..ea13f81596 100644
--- a/src/lib/libssl/ssl_clnt.c
+++ b/src/lib/libssl/ssl_clnt.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_clnt.c,v 1.113 2021/10/23 08:34:36 jsing Exp $ */ 1/* $OpenBSD: ssl_clnt.c,v 1.114 2021/10/23 13:36:03 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -249,7 +249,7 @@ ssl3_connect(SSL *s)
249 /* mark client_random uninitialized */ 249 /* mark client_random uninitialized */
250 memset(s->s3->client_random, 0, 250 memset(s->s3->client_random, 0,
251 sizeof(s->s3->client_random)); 251 sizeof(s->s3->client_random));
252 D1I(s)->send_cookie = 0; 252 s->d1->send_cookie = 0;
253 s->internal->hit = 0; 253 s->internal->hit = 0;
254 } 254 }
255 break; 255 break;
@@ -269,7 +269,7 @@ ssl3_connect(SSL *s)
269 if (ret <= 0) 269 if (ret <= 0)
270 goto end; 270 goto end;
271 271
272 if (SSL_is_dtls(s) && D1I(s)->send_cookie) { 272 if (SSL_is_dtls(s) && s->d1->send_cookie) {
273 S3I(s)->hs.state = SSL3_ST_CW_FLUSH; 273 S3I(s)->hs.state = SSL3_ST_CW_FLUSH;
274 S3I(s)->hs.tls12.next_state = SSL3_ST_CR_SRVR_HELLO_A; 274 S3I(s)->hs.tls12.next_state = SSL3_ST_CR_SRVR_HELLO_A;
275 } else 275 } else
@@ -314,7 +314,7 @@ ssl3_connect(SSL *s)
314 if (ret <= 0) 314 if (ret <= 0)
315 goto end; 315 goto end;
316 dtls1_stop_timer(s); 316 dtls1_stop_timer(s);
317 if (D1I(s)->send_cookie) /* start again, with a cookie */ 317 if (s->d1->send_cookie) /* start again, with a cookie */
318 S3I(s)->hs.state = SSL3_ST_CW_CLNT_HELLO_A; 318 S3I(s)->hs.state = SSL3_ST_CW_CLNT_HELLO_A;
319 else 319 else
320 S3I(s)->hs.state = SSL3_ST_CR_CERT_A; 320 S3I(s)->hs.state = SSL3_ST_CR_CERT_A;
@@ -529,7 +529,7 @@ ssl3_connect(SSL *s)
529 case SSL3_ST_CR_FINISHED_A: 529 case SSL3_ST_CR_FINISHED_A:
530 case SSL3_ST_CR_FINISHED_B: 530 case SSL3_ST_CR_FINISHED_B:
531 if (SSL_is_dtls(s)) 531 if (SSL_is_dtls(s))
532 D1I(s)->change_cipher_spec_ok = 1; 532 s->d1->change_cipher_spec_ok = 1;
533 else 533 else
534 s->s3->flags |= SSL3_FLAGS_CCS_OK; 534 s->s3->flags |= SSL3_FLAGS_CCS_OK;
535 ret = ssl3_get_finished(s, SSL3_ST_CR_FINISHED_A, 535 ret = ssl3_get_finished(s, SSL3_ST_CR_FINISHED_A,
@@ -595,8 +595,8 @@ ssl3_connect(SSL *s)
595 595
596 if (SSL_is_dtls(s)) { 596 if (SSL_is_dtls(s)) {
597 /* done with handshaking */ 597 /* done with handshaking */
598 D1I(s)->handshake_read_seq = 0; 598 s->d1->handshake_read_seq = 0;
599 D1I(s)->next_handshake_write_seq = 0; 599 s->d1->next_handshake_write_seq = 0;
600 } 600 }
601 601
602 goto end; 602 goto end;
@@ -666,7 +666,7 @@ ssl3_send_client_hello(SSL *s)
666 * HelloVerifyRequest, we must retain the original client 666 * HelloVerifyRequest, we must retain the original client
667 * random value. 667 * random value.
668 */ 668 */
669 if (!SSL_is_dtls(s) || D1I(s)->send_cookie == 0) 669 if (!SSL_is_dtls(s) || s->d1->send_cookie == 0)
670 arc4random_buf(s->s3->client_random, SSL3_RANDOM_SIZE); 670 arc4random_buf(s->s3->client_random, SSL3_RANDOM_SIZE);
671 671
672 if (!ssl3_handshake_msg_start(s, &cbb, &client_hello, 672 if (!ssl3_handshake_msg_start(s, &cbb, &client_hello,
@@ -728,14 +728,14 @@ ssl3_send_client_hello(SSL *s)
728 728
729 /* DTLS Cookie. */ 729 /* DTLS Cookie. */
730 if (SSL_is_dtls(s)) { 730 if (SSL_is_dtls(s)) {
731 if (D1I(s)->cookie_len > sizeof(D1I(s)->cookie)) { 731 if (s->d1->cookie_len > sizeof(s->d1->cookie)) {
732 SSLerror(s, ERR_R_INTERNAL_ERROR); 732 SSLerror(s, ERR_R_INTERNAL_ERROR);
733 goto err; 733 goto err;
734 } 734 }
735 if (!CBB_add_u8_length_prefixed(&client_hello, &cookie)) 735 if (!CBB_add_u8_length_prefixed(&client_hello, &cookie))
736 goto err; 736 goto err;
737 if (!CBB_add_bytes(&cookie, D1I(s)->cookie, 737 if (!CBB_add_bytes(&cookie, s->d1->cookie,
738 D1I(s)->cookie_len)) 738 s->d1->cookie_len))
739 goto err; 739 goto err;
740 } 740 }
741 741
@@ -789,7 +789,7 @@ ssl3_get_dtls_hello_verify(SSL *s)
789 return ret; 789 return ret;
790 790
791 if (S3I(s)->hs.tls12.message_type != DTLS1_MT_HELLO_VERIFY_REQUEST) { 791 if (S3I(s)->hs.tls12.message_type != DTLS1_MT_HELLO_VERIFY_REQUEST) {
792 D1I(s)->send_cookie = 0; 792 s->d1->send_cookie = 0;
793 S3I(s)->hs.tls12.reuse_message = 1; 793 S3I(s)->hs.tls12.reuse_message = 1;
794 return (1); 794 return (1);
795 } 795 }
@@ -819,14 +819,14 @@ ssl3_get_dtls_hello_verify(SSL *s)
819 goto fatal_err; 819 goto fatal_err;
820 } 820 }
821 821
822 if (!CBS_write_bytes(&cookie, D1I(s)->cookie, 822 if (!CBS_write_bytes(&cookie, s->d1->cookie,
823 sizeof(D1I(s)->cookie), &cookie_len)) { 823 sizeof(s->d1->cookie), &cookie_len)) {
824 D1I(s)->cookie_len = 0; 824 s->d1->cookie_len = 0;
825 al = SSL_AD_ILLEGAL_PARAMETER; 825 al = SSL_AD_ILLEGAL_PARAMETER;
826 goto fatal_err; 826 goto fatal_err;
827 } 827 }
828 D1I(s)->cookie_len = cookie_len; 828 s->d1->cookie_len = cookie_len;
829 D1I(s)->send_cookie = 1; 829 s->d1->send_cookie = 1;
830 830
831 return 1; 831 return 1;
832 832
@@ -862,7 +862,7 @@ ssl3_get_server_hello(SSL *s)
862 862
863 if (SSL_is_dtls(s)) { 863 if (SSL_is_dtls(s)) {
864 if (S3I(s)->hs.tls12.message_type == DTLS1_MT_HELLO_VERIFY_REQUEST) { 864 if (S3I(s)->hs.tls12.message_type == DTLS1_MT_HELLO_VERIFY_REQUEST) {
865 if (D1I(s)->send_cookie == 0) { 865 if (s->d1->send_cookie == 0) {
866 S3I(s)->hs.tls12.reuse_message = 1; 866 S3I(s)->hs.tls12.reuse_message = 1;
867 return (1); 867 return (1);
868 } else { 868 } else {