diff options
Diffstat (limited to 'src/lib/libssl/ssl_clnt.c')
-rw-r--r-- | src/lib/libssl/ssl_clnt.c | 42 |
1 files changed, 21 insertions, 21 deletions
diff --git a/src/lib/libssl/ssl_clnt.c b/src/lib/libssl/ssl_clnt.c index 92113c2953..6b43b565b9 100644 --- a/src/lib/libssl/ssl_clnt.c +++ b/src/lib/libssl/ssl_clnt.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_clnt.c,v 1.90 2021/04/11 07:06:01 tb Exp $ */ | 1 | /* $OpenBSD: ssl_clnt.c,v 1.91 2021/04/19 16:51:56 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -623,7 +623,7 @@ ssl3_connect(SSL *s) | |||
623 | } | 623 | } |
624 | 624 | ||
625 | /* did we do anything */ | 625 | /* did we do anything */ |
626 | if (!S3I(s)->tmp.reuse_message && !skip) { | 626 | if (!S3I(s)->hs.tls12.reuse_message && !skip) { |
627 | if (s->internal->debug) { | 627 | if (s->internal->debug) { |
628 | if ((ret = BIO_flush(s->wbio)) <= 0) | 628 | if ((ret = BIO_flush(s->wbio)) <= 0) |
629 | goto end; | 629 | goto end; |
@@ -804,9 +804,9 @@ ssl3_get_dtls_hello_verify(SSL *s) | |||
804 | if (!ok) | 804 | if (!ok) |
805 | return ((int)n); | 805 | return ((int)n); |
806 | 806 | ||
807 | if (S3I(s)->tmp.message_type != DTLS1_MT_HELLO_VERIFY_REQUEST) { | 807 | if (S3I(s)->hs.tls12.message_type != DTLS1_MT_HELLO_VERIFY_REQUEST) { |
808 | D1I(s)->send_cookie = 0; | 808 | D1I(s)->send_cookie = 0; |
809 | S3I(s)->tmp.reuse_message = 1; | 809 | S3I(s)->hs.tls12.reuse_message = 1; |
810 | return (1); | 810 | return (1); |
811 | } | 811 | } |
812 | 812 | ||
@@ -878,9 +878,9 @@ ssl3_get_server_hello(SSL *s) | |||
878 | CBS_init(&cbs, s->internal->init_msg, n); | 878 | CBS_init(&cbs, s->internal->init_msg, n); |
879 | 879 | ||
880 | if (SSL_is_dtls(s)) { | 880 | if (SSL_is_dtls(s)) { |
881 | if (S3I(s)->tmp.message_type == DTLS1_MT_HELLO_VERIFY_REQUEST) { | 881 | if (S3I(s)->hs.tls12.message_type == DTLS1_MT_HELLO_VERIFY_REQUEST) { |
882 | if (D1I(s)->send_cookie == 0) { | 882 | if (D1I(s)->send_cookie == 0) { |
883 | S3I(s)->tmp.reuse_message = 1; | 883 | S3I(s)->hs.tls12.reuse_message = 1; |
884 | return (1); | 884 | return (1); |
885 | } else { | 885 | } else { |
886 | /* Already sent a cookie. */ | 886 | /* Already sent a cookie. */ |
@@ -891,7 +891,7 @@ ssl3_get_server_hello(SSL *s) | |||
891 | } | 891 | } |
892 | } | 892 | } |
893 | 893 | ||
894 | if (S3I(s)->tmp.message_type != SSL3_MT_SERVER_HELLO) { | 894 | if (S3I(s)->hs.tls12.message_type != SSL3_MT_SERVER_HELLO) { |
895 | al = SSL_AD_UNEXPECTED_MESSAGE; | 895 | al = SSL_AD_UNEXPECTED_MESSAGE; |
896 | SSLerror(s, SSL_R_BAD_MESSAGE_TYPE); | 896 | SSLerror(s, SSL_R_BAD_MESSAGE_TYPE); |
897 | goto fatal_err; | 897 | goto fatal_err; |
@@ -1128,12 +1128,12 @@ ssl3_get_server_certificate(SSL *s) | |||
1128 | if (!ok) | 1128 | if (!ok) |
1129 | return ((int)n); | 1129 | return ((int)n); |
1130 | 1130 | ||
1131 | if (S3I(s)->tmp.message_type == SSL3_MT_SERVER_KEY_EXCHANGE) { | 1131 | if (S3I(s)->hs.tls12.message_type == SSL3_MT_SERVER_KEY_EXCHANGE) { |
1132 | S3I(s)->tmp.reuse_message = 1; | 1132 | S3I(s)->hs.tls12.reuse_message = 1; |
1133 | return (1); | 1133 | return (1); |
1134 | } | 1134 | } |
1135 | 1135 | ||
1136 | if (S3I(s)->tmp.message_type != SSL3_MT_CERTIFICATE) { | 1136 | if (S3I(s)->hs.tls12.message_type != SSL3_MT_CERTIFICATE) { |
1137 | al = SSL_AD_UNEXPECTED_MESSAGE; | 1137 | al = SSL_AD_UNEXPECTED_MESSAGE; |
1138 | SSLerror(s, SSL_R_BAD_MESSAGE_TYPE); | 1138 | SSLerror(s, SSL_R_BAD_MESSAGE_TYPE); |
1139 | goto fatal_err; | 1139 | goto fatal_err; |
@@ -1498,7 +1498,7 @@ ssl3_get_server_key_exchange(SSL *s) | |||
1498 | 1498 | ||
1499 | CBS_init(&cbs, s->internal->init_msg, n); | 1499 | CBS_init(&cbs, s->internal->init_msg, n); |
1500 | 1500 | ||
1501 | if (S3I(s)->tmp.message_type != SSL3_MT_SERVER_KEY_EXCHANGE) { | 1501 | if (S3I(s)->hs.tls12.message_type != SSL3_MT_SERVER_KEY_EXCHANGE) { |
1502 | /* | 1502 | /* |
1503 | * Do not skip server key exchange if this cipher suite uses | 1503 | * Do not skip server key exchange if this cipher suite uses |
1504 | * ephemeral keys. | 1504 | * ephemeral keys. |
@@ -1509,7 +1509,7 @@ ssl3_get_server_key_exchange(SSL *s) | |||
1509 | goto fatal_err; | 1509 | goto fatal_err; |
1510 | } | 1510 | } |
1511 | 1511 | ||
1512 | S3I(s)->tmp.reuse_message = 1; | 1512 | S3I(s)->hs.tls12.reuse_message = 1; |
1513 | EVP_MD_CTX_cleanup(&md_ctx); | 1513 | EVP_MD_CTX_cleanup(&md_ctx); |
1514 | return (1); | 1514 | return (1); |
1515 | } | 1515 | } |
@@ -1663,8 +1663,8 @@ ssl3_get_certificate_request(SSL *s) | |||
1663 | 1663 | ||
1664 | S3I(s)->tmp.cert_req = 0; | 1664 | S3I(s)->tmp.cert_req = 0; |
1665 | 1665 | ||
1666 | if (S3I(s)->tmp.message_type == SSL3_MT_SERVER_DONE) { | 1666 | if (S3I(s)->hs.tls12.message_type == SSL3_MT_SERVER_DONE) { |
1667 | S3I(s)->tmp.reuse_message = 1; | 1667 | S3I(s)->hs.tls12.reuse_message = 1; |
1668 | /* | 1668 | /* |
1669 | * If we get here we don't need any cached handshake records | 1669 | * If we get here we don't need any cached handshake records |
1670 | * as we wont be doing client auth. | 1670 | * as we wont be doing client auth. |
@@ -1673,7 +1673,7 @@ ssl3_get_certificate_request(SSL *s) | |||
1673 | return (1); | 1673 | return (1); |
1674 | } | 1674 | } |
1675 | 1675 | ||
1676 | if (S3I(s)->tmp.message_type != SSL3_MT_CERTIFICATE_REQUEST) { | 1676 | if (S3I(s)->hs.tls12.message_type != SSL3_MT_CERTIFICATE_REQUEST) { |
1677 | ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_UNEXPECTED_MESSAGE); | 1677 | ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_UNEXPECTED_MESSAGE); |
1678 | SSLerror(s, SSL_R_WRONG_MESSAGE_TYPE); | 1678 | SSLerror(s, SSL_R_WRONG_MESSAGE_TYPE); |
1679 | goto err; | 1679 | goto err; |
@@ -1814,11 +1814,11 @@ ssl3_get_new_session_ticket(SSL *s) | |||
1814 | if (!ok) | 1814 | if (!ok) |
1815 | return ((int)n); | 1815 | return ((int)n); |
1816 | 1816 | ||
1817 | if (S3I(s)->tmp.message_type == SSL3_MT_FINISHED) { | 1817 | if (S3I(s)->hs.tls12.message_type == SSL3_MT_FINISHED) { |
1818 | S3I(s)->tmp.reuse_message = 1; | 1818 | S3I(s)->hs.tls12.reuse_message = 1; |
1819 | return (1); | 1819 | return (1); |
1820 | } | 1820 | } |
1821 | if (S3I(s)->tmp.message_type != SSL3_MT_NEWSESSION_TICKET) { | 1821 | if (S3I(s)->hs.tls12.message_type != SSL3_MT_NEWSESSION_TICKET) { |
1822 | al = SSL_AD_UNEXPECTED_MESSAGE; | 1822 | al = SSL_AD_UNEXPECTED_MESSAGE; |
1823 | SSLerror(s, SSL_R_BAD_MESSAGE_TYPE); | 1823 | SSLerror(s, SSL_R_BAD_MESSAGE_TYPE); |
1824 | goto fatal_err; | 1824 | goto fatal_err; |
@@ -2799,9 +2799,9 @@ ssl3_check_finished(SSL *s) | |||
2799 | if (!ok) | 2799 | if (!ok) |
2800 | return ((int)n); | 2800 | return ((int)n); |
2801 | 2801 | ||
2802 | S3I(s)->tmp.reuse_message = 1; | 2802 | S3I(s)->hs.tls12.reuse_message = 1; |
2803 | if ((S3I(s)->tmp.message_type == SSL3_MT_FINISHED) || | 2803 | if ((S3I(s)->hs.tls12.message_type == SSL3_MT_FINISHED) || |
2804 | (S3I(s)->tmp.message_type == SSL3_MT_NEWSESSION_TICKET)) | 2804 | (S3I(s)->hs.tls12.message_type == SSL3_MT_NEWSESSION_TICKET)) |
2805 | return (2); | 2805 | return (2); |
2806 | 2806 | ||
2807 | return (1); | 2807 | return (1); |