summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_clnt.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/ssl_clnt.c')
-rw-r--r--src/lib/libssl/ssl_clnt.c34
1 files changed, 17 insertions, 17 deletions
diff --git a/src/lib/libssl/ssl_clnt.c b/src/lib/libssl/ssl_clnt.c
index 6fb5eca4b3..f6ca3e7f3c 100644
--- a/src/lib/libssl/ssl_clnt.c
+++ b/src/lib/libssl/ssl_clnt.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_clnt.c,v 1.12 2017/04/10 06:09:32 jsing Exp $ */ 1/* $OpenBSD: ssl_clnt.c,v 1.13 2017/05/06 22:24:57 beck Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -292,7 +292,7 @@ ssl3_connect(SSL *s)
292 break; 292 break;
293 } 293 }
294 /* Check if it is anon DH/ECDH. */ 294 /* Check if it is anon DH/ECDH. */
295 if (!(S3I(s)->tmp.new_cipher->algorithm_auth & 295 if (!(S3I(s)->hs.new_cipher->algorithm_auth &
296 SSL_aNULL)) { 296 SSL_aNULL)) {
297 ret = ssl3_get_server_certificate(s); 297 ret = ssl3_get_server_certificate(s);
298 if (ret <= 0) 298 if (ret <= 0)
@@ -417,7 +417,7 @@ ssl3_connect(SSL *s)
417 s->internal->state = SSL3_ST_CW_FINISHED_A; 417 s->internal->state = SSL3_ST_CW_FINISHED_A;
418 s->internal->init_num = 0; 418 s->internal->init_num = 0;
419 419
420 s->session->cipher = S3I(s)->tmp.new_cipher; 420 s->session->cipher = S3I(s)->hs.new_cipher;
421 if (!tls1_setup_key_block(s)) { 421 if (!tls1_setup_key_block(s)) {
422 ret = -1; 422 ret = -1;
423 goto end; 423 goto end;
@@ -453,7 +453,7 @@ ssl3_connect(SSL *s)
453 /* clear flags */ 453 /* clear flags */
454 s->s3->flags &= ~SSL3_FLAGS_POP_BUFFER; 454 s->s3->flags &= ~SSL3_FLAGS_POP_BUFFER;
455 if (s->internal->hit) { 455 if (s->internal->hit) {
456 S3I(s)->tmp.next_state = SSL_ST_OK; 456 S3I(s)->hs.next_state = SSL_ST_OK;
457 if (s->s3->flags & 457 if (s->s3->flags &
458 SSL3_FLAGS_DELAY_CLIENT_FINISHED) { 458 SSL3_FLAGS_DELAY_CLIENT_FINISHED) {
459 s->internal->state = SSL_ST_OK; 459 s->internal->state = SSL_ST_OK;
@@ -463,11 +463,11 @@ ssl3_connect(SSL *s)
463 } else { 463 } else {
464 /* Allow NewSessionTicket if ticket expected */ 464 /* Allow NewSessionTicket if ticket expected */
465 if (s->internal->tlsext_ticket_expected) 465 if (s->internal->tlsext_ticket_expected)
466 S3I(s)->tmp.next_state = 466 S3I(s)->hs.next_state =
467 SSL3_ST_CR_SESSION_TICKET_A; 467 SSL3_ST_CR_SESSION_TICKET_A;
468 else 468 else
469 469
470 S3I(s)->tmp.next_state = SSL3_ST_CR_FINISHED_A; 470 S3I(s)->hs.next_state = SSL3_ST_CR_FINISHED_A;
471 } 471 }
472 s->internal->init_num = 0; 472 s->internal->init_num = 0;
473 break; 473 break;
@@ -512,7 +512,7 @@ ssl3_connect(SSL *s)
512 goto end; 512 goto end;
513 } 513 }
514 s->internal->rwstate = SSL_NOTHING; 514 s->internal->rwstate = SSL_NOTHING;
515 s->internal->state = S3I(s)->tmp.next_state; 515 s->internal->state = S3I(s)->hs.next_state;
516 break; 516 break;
517 517
518 case SSL_ST_OK: 518 case SSL_ST_OK:
@@ -899,7 +899,7 @@ ssl3_get_server_hello(SSL *s)
899 SSLerror(s, SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED); 899 SSLerror(s, SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED);
900 goto f_err; 900 goto f_err;
901 } 901 }
902 S3I(s)->tmp.new_cipher = cipher; 902 S3I(s)->hs.new_cipher = cipher;
903 903
904 if (!tls1_handshake_hash_init(s)) 904 if (!tls1_handshake_hash_init(s))
905 goto err; 905 goto err;
@@ -908,7 +908,7 @@ ssl3_get_server_hello(SSL *s)
908 * Don't digest cached records if no sigalgs: we may need them for 908 * Don't digest cached records if no sigalgs: we may need them for
909 * client authentication. 909 * client authentication.
910 */ 910 */
911 alg_k = S3I(s)->tmp.new_cipher->algorithm_mkey; 911 alg_k = S3I(s)->hs.new_cipher->algorithm_mkey;
912 if (!(SSL_USE_SIGALGS(s) || (alg_k & SSL_kGOST)) && 912 if (!(SSL_USE_SIGALGS(s) || (alg_k & SSL_kGOST)) &&
913 !tls1_digest_cached_records(s)) { 913 !tls1_digest_cached_records(s)) {
914 al = SSL_AD_INTERNAL_ERROR; 914 al = SSL_AD_INTERNAL_ERROR;
@@ -1116,7 +1116,7 @@ ssl3_get_server_kex_dhe(SSL *s, EVP_PKEY **pkey, unsigned char **pp, long *nn)
1116 long alg_a; 1116 long alg_a;
1117 int al; 1117 int al;
1118 1118
1119 alg_a = S3I(s)->tmp.new_cipher->algorithm_auth; 1119 alg_a = S3I(s)->hs.new_cipher->algorithm_auth;
1120 sc = SSI(s)->sess_cert; 1120 sc = SSI(s)->sess_cert;
1121 1121
1122 if (*nn < 0) 1122 if (*nn < 0)
@@ -1283,7 +1283,7 @@ ssl3_get_server_kex_ecdhe(SSL *s, EVP_PKEY **pkey, unsigned char **pp, long *nn)
1283 int nid; 1283 int nid;
1284 int al; 1284 int al;
1285 1285
1286 alg_a = S3I(s)->tmp.new_cipher->algorithm_auth; 1286 alg_a = S3I(s)->hs.new_cipher->algorithm_auth;
1287 sc = SSI(s)->sess_cert; 1287 sc = SSI(s)->sess_cert;
1288 1288
1289 if (*nn < 0) 1289 if (*nn < 0)
@@ -1368,8 +1368,8 @@ ssl3_get_server_key_exchange(SSL *s)
1368 const EVP_MD *md = NULL; 1368 const EVP_MD *md = NULL;
1369 RSA *rsa = NULL; 1369 RSA *rsa = NULL;
1370 1370
1371 alg_k = S3I(s)->tmp.new_cipher->algorithm_mkey; 1371 alg_k = S3I(s)->hs.new_cipher->algorithm_mkey;
1372 alg_a = S3I(s)->tmp.new_cipher->algorithm_auth; 1372 alg_a = S3I(s)->hs.new_cipher->algorithm_auth;
1373 1373
1374 /* 1374 /*
1375 * Use same message size as in ssl3_get_certificate_request() 1375 * Use same message size as in ssl3_get_certificate_request()
@@ -1590,7 +1590,7 @@ ssl3_get_certificate_request(SSL *s)
1590 } 1590 }
1591 1591
1592 /* TLS does not like anon-DH with client cert */ 1592 /* TLS does not like anon-DH with client cert */
1593 if (S3I(s)->tmp.new_cipher->algorithm_auth & SSL_aNULL) { 1593 if (S3I(s)->hs.new_cipher->algorithm_auth & SSL_aNULL) {
1594 ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_UNEXPECTED_MESSAGE); 1594 ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_UNEXPECTED_MESSAGE);
1595 SSLerror(s, SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER); 1595 SSLerror(s, SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER);
1596 goto err; 1596 goto err;
@@ -2274,7 +2274,7 @@ ssl3_send_client_key_exchange(SSL *s)
2274 memset(&cbb, 0, sizeof(cbb)); 2274 memset(&cbb, 0, sizeof(cbb));
2275 2275
2276 if (s->internal->state == SSL3_ST_CW_KEY_EXCH_A) { 2276 if (s->internal->state == SSL3_ST_CW_KEY_EXCH_A) {
2277 alg_k = S3I(s)->tmp.new_cipher->algorithm_mkey; 2277 alg_k = S3I(s)->hs.new_cipher->algorithm_mkey;
2278 2278
2279 if ((sess_cert = SSI(s)->sess_cert) == NULL) { 2279 if ((sess_cert = SSI(s)->sess_cert) == NULL) {
2280 ssl3_send_alert(s, SSL3_AL_FATAL, 2280 ssl3_send_alert(s, SSL3_AL_FATAL,
@@ -2558,8 +2558,8 @@ ssl3_check_cert_and_algorithm(SSL *s)
2558 SESS_CERT *sc; 2558 SESS_CERT *sc;
2559 DH *dh; 2559 DH *dh;
2560 2560
2561 alg_k = S3I(s)->tmp.new_cipher->algorithm_mkey; 2561 alg_k = S3I(s)->hs.new_cipher->algorithm_mkey;
2562 alg_a = S3I(s)->tmp.new_cipher->algorithm_auth; 2562 alg_a = S3I(s)->hs.new_cipher->algorithm_auth;
2563 2563
2564 /* We don't have a certificate. */ 2564 /* We don't have a certificate. */
2565 if (alg_a & SSL_aNULL) 2565 if (alg_a & SSL_aNULL)