diff options
Diffstat (limited to 'src/lib/libssl/ssl_clnt.c')
-rw-r--r-- | src/lib/libssl/ssl_clnt.c | 36 |
1 files changed, 18 insertions, 18 deletions
diff --git a/src/lib/libssl/ssl_clnt.c b/src/lib/libssl/ssl_clnt.c index 8a4c54e7b7..ea13f81596 100644 --- a/src/lib/libssl/ssl_clnt.c +++ b/src/lib/libssl/ssl_clnt.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_clnt.c,v 1.113 2021/10/23 08:34:36 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_clnt.c,v 1.114 2021/10/23 13:36:03 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -249,7 +249,7 @@ ssl3_connect(SSL *s) | |||
249 | /* mark client_random uninitialized */ | 249 | /* mark client_random uninitialized */ |
250 | memset(s->s3->client_random, 0, | 250 | memset(s->s3->client_random, 0, |
251 | sizeof(s->s3->client_random)); | 251 | sizeof(s->s3->client_random)); |
252 | D1I(s)->send_cookie = 0; | 252 | s->d1->send_cookie = 0; |
253 | s->internal->hit = 0; | 253 | s->internal->hit = 0; |
254 | } | 254 | } |
255 | break; | 255 | break; |
@@ -269,7 +269,7 @@ ssl3_connect(SSL *s) | |||
269 | if (ret <= 0) | 269 | if (ret <= 0) |
270 | goto end; | 270 | goto end; |
271 | 271 | ||
272 | if (SSL_is_dtls(s) && D1I(s)->send_cookie) { | 272 | if (SSL_is_dtls(s) && s->d1->send_cookie) { |
273 | S3I(s)->hs.state = SSL3_ST_CW_FLUSH; | 273 | S3I(s)->hs.state = SSL3_ST_CW_FLUSH; |
274 | S3I(s)->hs.tls12.next_state = SSL3_ST_CR_SRVR_HELLO_A; | 274 | S3I(s)->hs.tls12.next_state = SSL3_ST_CR_SRVR_HELLO_A; |
275 | } else | 275 | } else |
@@ -314,7 +314,7 @@ ssl3_connect(SSL *s) | |||
314 | if (ret <= 0) | 314 | if (ret <= 0) |
315 | goto end; | 315 | goto end; |
316 | dtls1_stop_timer(s); | 316 | dtls1_stop_timer(s); |
317 | if (D1I(s)->send_cookie) /* start again, with a cookie */ | 317 | if (s->d1->send_cookie) /* start again, with a cookie */ |
318 | S3I(s)->hs.state = SSL3_ST_CW_CLNT_HELLO_A; | 318 | S3I(s)->hs.state = SSL3_ST_CW_CLNT_HELLO_A; |
319 | else | 319 | else |
320 | S3I(s)->hs.state = SSL3_ST_CR_CERT_A; | 320 | S3I(s)->hs.state = SSL3_ST_CR_CERT_A; |
@@ -529,7 +529,7 @@ ssl3_connect(SSL *s) | |||
529 | case SSL3_ST_CR_FINISHED_A: | 529 | case SSL3_ST_CR_FINISHED_A: |
530 | case SSL3_ST_CR_FINISHED_B: | 530 | case SSL3_ST_CR_FINISHED_B: |
531 | if (SSL_is_dtls(s)) | 531 | if (SSL_is_dtls(s)) |
532 | D1I(s)->change_cipher_spec_ok = 1; | 532 | s->d1->change_cipher_spec_ok = 1; |
533 | else | 533 | else |
534 | s->s3->flags |= SSL3_FLAGS_CCS_OK; | 534 | s->s3->flags |= SSL3_FLAGS_CCS_OK; |
535 | ret = ssl3_get_finished(s, SSL3_ST_CR_FINISHED_A, | 535 | ret = ssl3_get_finished(s, SSL3_ST_CR_FINISHED_A, |
@@ -595,8 +595,8 @@ ssl3_connect(SSL *s) | |||
595 | 595 | ||
596 | if (SSL_is_dtls(s)) { | 596 | if (SSL_is_dtls(s)) { |
597 | /* done with handshaking */ | 597 | /* done with handshaking */ |
598 | D1I(s)->handshake_read_seq = 0; | 598 | s->d1->handshake_read_seq = 0; |
599 | D1I(s)->next_handshake_write_seq = 0; | 599 | s->d1->next_handshake_write_seq = 0; |
600 | } | 600 | } |
601 | 601 | ||
602 | goto end; | 602 | goto end; |
@@ -666,7 +666,7 @@ ssl3_send_client_hello(SSL *s) | |||
666 | * HelloVerifyRequest, we must retain the original client | 666 | * HelloVerifyRequest, we must retain the original client |
667 | * random value. | 667 | * random value. |
668 | */ | 668 | */ |
669 | if (!SSL_is_dtls(s) || D1I(s)->send_cookie == 0) | 669 | if (!SSL_is_dtls(s) || s->d1->send_cookie == 0) |
670 | arc4random_buf(s->s3->client_random, SSL3_RANDOM_SIZE); | 670 | arc4random_buf(s->s3->client_random, SSL3_RANDOM_SIZE); |
671 | 671 | ||
672 | if (!ssl3_handshake_msg_start(s, &cbb, &client_hello, | 672 | if (!ssl3_handshake_msg_start(s, &cbb, &client_hello, |
@@ -728,14 +728,14 @@ ssl3_send_client_hello(SSL *s) | |||
728 | 728 | ||
729 | /* DTLS Cookie. */ | 729 | /* DTLS Cookie. */ |
730 | if (SSL_is_dtls(s)) { | 730 | if (SSL_is_dtls(s)) { |
731 | if (D1I(s)->cookie_len > sizeof(D1I(s)->cookie)) { | 731 | if (s->d1->cookie_len > sizeof(s->d1->cookie)) { |
732 | SSLerror(s, ERR_R_INTERNAL_ERROR); | 732 | SSLerror(s, ERR_R_INTERNAL_ERROR); |
733 | goto err; | 733 | goto err; |
734 | } | 734 | } |
735 | if (!CBB_add_u8_length_prefixed(&client_hello, &cookie)) | 735 | if (!CBB_add_u8_length_prefixed(&client_hello, &cookie)) |
736 | goto err; | 736 | goto err; |
737 | if (!CBB_add_bytes(&cookie, D1I(s)->cookie, | 737 | if (!CBB_add_bytes(&cookie, s->d1->cookie, |
738 | D1I(s)->cookie_len)) | 738 | s->d1->cookie_len)) |
739 | goto err; | 739 | goto err; |
740 | } | 740 | } |
741 | 741 | ||
@@ -789,7 +789,7 @@ ssl3_get_dtls_hello_verify(SSL *s) | |||
789 | return ret; | 789 | return ret; |
790 | 790 | ||
791 | if (S3I(s)->hs.tls12.message_type != DTLS1_MT_HELLO_VERIFY_REQUEST) { | 791 | if (S3I(s)->hs.tls12.message_type != DTLS1_MT_HELLO_VERIFY_REQUEST) { |
792 | D1I(s)->send_cookie = 0; | 792 | s->d1->send_cookie = 0; |
793 | S3I(s)->hs.tls12.reuse_message = 1; | 793 | S3I(s)->hs.tls12.reuse_message = 1; |
794 | return (1); | 794 | return (1); |
795 | } | 795 | } |
@@ -819,14 +819,14 @@ ssl3_get_dtls_hello_verify(SSL *s) | |||
819 | goto fatal_err; | 819 | goto fatal_err; |
820 | } | 820 | } |
821 | 821 | ||
822 | if (!CBS_write_bytes(&cookie, D1I(s)->cookie, | 822 | if (!CBS_write_bytes(&cookie, s->d1->cookie, |
823 | sizeof(D1I(s)->cookie), &cookie_len)) { | 823 | sizeof(s->d1->cookie), &cookie_len)) { |
824 | D1I(s)->cookie_len = 0; | 824 | s->d1->cookie_len = 0; |
825 | al = SSL_AD_ILLEGAL_PARAMETER; | 825 | al = SSL_AD_ILLEGAL_PARAMETER; |
826 | goto fatal_err; | 826 | goto fatal_err; |
827 | } | 827 | } |
828 | D1I(s)->cookie_len = cookie_len; | 828 | s->d1->cookie_len = cookie_len; |
829 | D1I(s)->send_cookie = 1; | 829 | s->d1->send_cookie = 1; |
830 | 830 | ||
831 | return 1; | 831 | return 1; |
832 | 832 | ||
@@ -862,7 +862,7 @@ ssl3_get_server_hello(SSL *s) | |||
862 | 862 | ||
863 | if (SSL_is_dtls(s)) { | 863 | if (SSL_is_dtls(s)) { |
864 | if (S3I(s)->hs.tls12.message_type == DTLS1_MT_HELLO_VERIFY_REQUEST) { | 864 | if (S3I(s)->hs.tls12.message_type == DTLS1_MT_HELLO_VERIFY_REQUEST) { |
865 | if (D1I(s)->send_cookie == 0) { | 865 | if (s->d1->send_cookie == 0) { |
866 | S3I(s)->hs.tls12.reuse_message = 1; | 866 | S3I(s)->hs.tls12.reuse_message = 1; |
867 | return (1); | 867 | return (1); |
868 | } else { | 868 | } else { |