summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_lib.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/ssl_lib.c')
-rw-r--r--src/lib/libssl/ssl_lib.c46
1 files changed, 23 insertions, 23 deletions
diff --git a/src/lib/libssl/ssl_lib.c b/src/lib/libssl/ssl_lib.c
index 91080e9360..ad7fe4d575 100644
--- a/src/lib/libssl/ssl_lib.c
+++ b/src/lib/libssl/ssl_lib.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_lib.c,v 1.287 2022/01/14 09:10:11 tb Exp $ */ 1/* $OpenBSD: ssl_lib.c,v 1.288 2022/02/05 14:54:10 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -732,10 +732,10 @@ SSL_get_finished(const SSL *s, void *buf, size_t count)
732{ 732{
733 size_t ret; 733 size_t ret;
734 734
735 ret = S3I(s)->hs.finished_len; 735 ret = s->s3->hs.finished_len;
736 if (count > ret) 736 if (count > ret)
737 count = ret; 737 count = ret;
738 memcpy(buf, S3I(s)->hs.finished, count); 738 memcpy(buf, s->s3->hs.finished, count);
739 return (ret); 739 return (ret);
740} 740}
741 741
@@ -745,10 +745,10 @@ SSL_get_peer_finished(const SSL *s, void *buf, size_t count)
745{ 745{
746 size_t ret; 746 size_t ret;
747 747
748 ret = S3I(s)->hs.peer_finished_len; 748 ret = s->s3->hs.peer_finished_len;
749 if (count > ret) 749 if (count > ret)
750 count = ret; 750 count = ret;
751 memcpy(buf, S3I(s)->hs.peer_finished, count); 751 memcpy(buf, s->s3->hs.peer_finished, count);
752 return (ret); 752 return (ret);
753} 753}
754 754
@@ -1294,7 +1294,7 @@ SSL_ctrl(SSL *s, int cmd, long larg, void *parg)
1294 return (1); 1294 return (1);
1295 case SSL_CTRL_GET_RI_SUPPORT: 1295 case SSL_CTRL_GET_RI_SUPPORT:
1296 if (s->s3) 1296 if (s->s3)
1297 return (S3I(s)->send_connection_binding); 1297 return (s->s3->send_connection_binding);
1298 else return (0); 1298 else return (0);
1299 default: 1299 default:
1300 if (SSL_is_dtls(s)) 1300 if (SSL_is_dtls(s))
@@ -1837,8 +1837,8 @@ void
1837SSL_get0_alpn_selected(const SSL *ssl, const unsigned char **data, 1837SSL_get0_alpn_selected(const SSL *ssl, const unsigned char **data,
1838 unsigned int *len) 1838 unsigned int *len)
1839{ 1839{
1840 *data = ssl->s3->internal->alpn_selected; 1840 *data = ssl->s3->alpn_selected;
1841 *len = ssl->s3->internal->alpn_selected_len; 1841 *len = ssl->s3->alpn_selected_len;
1842} 1842}
1843 1843
1844void 1844void
@@ -2224,8 +2224,8 @@ ssl_using_ecc_cipher(SSL *s)
2224{ 2224{
2225 unsigned long alg_a, alg_k; 2225 unsigned long alg_a, alg_k;
2226 2226
2227 alg_a = S3I(s)->hs.cipher->algorithm_auth; 2227 alg_a = s->s3->hs.cipher->algorithm_auth;
2228 alg_k = S3I(s)->hs.cipher->algorithm_mkey; 2228 alg_k = s->s3->hs.cipher->algorithm_mkey;
2229 2229
2230 return s->session->tlsext_ecpointformatlist != NULL && 2230 return s->session->tlsext_ecpointformatlist != NULL &&
2231 s->session->tlsext_ecpointformatlist_length > 0 && 2231 s->session->tlsext_ecpointformatlist_length > 0 &&
@@ -2235,7 +2235,7 @@ ssl_using_ecc_cipher(SSL *s)
2235int 2235int
2236ssl_check_srvr_ecc_cert_and_alg(SSL *s, X509 *x) 2236ssl_check_srvr_ecc_cert_and_alg(SSL *s, X509 *x)
2237{ 2237{
2238 const SSL_CIPHER *cs = S3I(s)->hs.cipher; 2238 const SSL_CIPHER *cs = s->s3->hs.cipher;
2239 unsigned long alg_a; 2239 unsigned long alg_a;
2240 2240
2241 alg_a = cs->algorithm_auth; 2241 alg_a = cs->algorithm_auth;
@@ -2259,9 +2259,9 @@ ssl_get_server_send_pkey(const SSL *s)
2259 int i; 2259 int i;
2260 2260
2261 c = s->cert; 2261 c = s->cert;
2262 ssl_set_cert_masks(c, S3I(s)->hs.cipher); 2262 ssl_set_cert_masks(c, s->s3->hs.cipher);
2263 2263
2264 alg_a = S3I(s)->hs.cipher->algorithm_auth; 2264 alg_a = s->s3->hs.cipher->algorithm_auth;
2265 2265
2266 if (alg_a & SSL_aECDSA) { 2266 if (alg_a & SSL_aECDSA) {
2267 i = SSL_PKEY_ECC; 2267 i = SSL_PKEY_ECC;
@@ -2319,9 +2319,9 @@ ssl_dhe_params_auto_key_bits(SSL *s)
2319 2319
2320 if (s->cert->dhe_params_auto == 2) { 2320 if (s->cert->dhe_params_auto == 2) {
2321 key_bits = 1024; 2321 key_bits = 1024;
2322 } else if (S3I(s)->hs.cipher->algorithm_auth & SSL_aNULL) { 2322 } else if (s->s3->hs.cipher->algorithm_auth & SSL_aNULL) {
2323 key_bits = 1024; 2323 key_bits = 1024;
2324 if (S3I(s)->hs.cipher->strength_bits == 256) 2324 if (s->s3->hs.cipher->strength_bits == 256)
2325 key_bits = 3072; 2325 key_bits = 3072;
2326 } else { 2326 } else {
2327 if ((cpk = ssl_get_server_send_pkey(s)) == NULL) 2327 if ((cpk = ssl_get_server_send_pkey(s)) == NULL)
@@ -2352,7 +2352,7 @@ ssl_should_update_external_cache(SSL *s, int mode)
2352 return 1; 2352 return 1;
2353 2353
2354 /* If it's TLS 1.3, do it to match OpenSSL */ 2354 /* If it's TLS 1.3, do it to match OpenSSL */
2355 if (S3I(s)->hs.negotiated_tls_version >= TLS1_3_VERSION) 2355 if (s->s3->hs.negotiated_tls_version >= TLS1_3_VERSION)
2356 return 1; 2356 return 1;
2357 2357
2358 return 0; 2358 return 0;
@@ -2377,7 +2377,7 @@ ssl_should_update_internal_cache(SSL *s, int mode)
2377 return 0; 2377 return 0;
2378 2378
2379 /* If we are lesser than TLS 1.3, Cache it. */ 2379 /* If we are lesser than TLS 1.3, Cache it. */
2380 if (S3I(s)->hs.negotiated_tls_version < TLS1_3_VERSION) 2380 if (s->s3->hs.negotiated_tls_version < TLS1_3_VERSION)
2381 return 1; 2381 return 1;
2382 2382
2383 /* Below this we consider TLS 1.3 or later */ 2383 /* Below this we consider TLS 1.3 or later */
@@ -2556,7 +2556,7 @@ SSL_get_error(const SSL *s, int i)
2556 2556
2557 if (i == 0) { 2557 if (i == 0) {
2558 if ((s->internal->shutdown & SSL_RECEIVED_SHUTDOWN) && 2558 if ((s->internal->shutdown & SSL_RECEIVED_SHUTDOWN) &&
2559 (S3I(s)->warn_alert == SSL_AD_CLOSE_NOTIFY)) 2559 (s->s3->warn_alert == SSL_AD_CLOSE_NOTIFY))
2560 return (SSL_ERROR_ZERO_RETURN); 2560 return (SSL_ERROR_ZERO_RETURN);
2561 } 2561 }
2562 return (SSL_ERROR_SYSCALL); 2562 return (SSL_ERROR_SYSCALL);
@@ -2589,7 +2589,7 @@ SSL_set_accept_state(SSL *s)
2589{ 2589{
2590 s->server = 1; 2590 s->server = 1;
2591 s->internal->shutdown = 0; 2591 s->internal->shutdown = 0;
2592 S3I(s)->hs.state = SSL_ST_ACCEPT|SSL_ST_BEFORE; 2592 s->s3->hs.state = SSL_ST_ACCEPT|SSL_ST_BEFORE;
2593 s->internal->handshake_func = s->method->ssl_accept; 2593 s->internal->handshake_func = s->method->ssl_accept;
2594 ssl_clear_cipher_state(s); 2594 ssl_clear_cipher_state(s);
2595} 2595}
@@ -2599,7 +2599,7 @@ SSL_set_connect_state(SSL *s)
2599{ 2599{
2600 s->server = 0; 2600 s->server = 0;
2601 s->internal->shutdown = 0; 2601 s->internal->shutdown = 0;
2602 S3I(s)->hs.state = SSL_ST_CONNECT|SSL_ST_BEFORE; 2602 s->s3->hs.state = SSL_ST_CONNECT|SSL_ST_BEFORE;
2603 s->internal->handshake_func = s->method->ssl_connect; 2603 s->internal->handshake_func = s->method->ssl_connect;
2604 ssl_clear_cipher_state(s); 2604 ssl_clear_cipher_state(s);
2605} 2605}
@@ -2731,7 +2731,7 @@ SSL_dup(SSL *s)
2731 ret->internal->quiet_shutdown = s->internal->quiet_shutdown; 2731 ret->internal->quiet_shutdown = s->internal->quiet_shutdown;
2732 ret->internal->shutdown = s->internal->shutdown; 2732 ret->internal->shutdown = s->internal->shutdown;
2733 /* SSL_dup does not really work at any state, though */ 2733 /* SSL_dup does not really work at any state, though */
2734 S3I(ret)->hs.state = S3I(s)->hs.state; 2734 ret->s3->hs.state = s->s3->hs.state;
2735 ret->internal->rstate = s->internal->rstate; 2735 ret->internal->rstate = s->internal->rstate;
2736 2736
2737 /* 2737 /*
@@ -3018,13 +3018,13 @@ void (*SSL_get_info_callback(const SSL *ssl))(const SSL *ssl, int type, int val)
3018int 3018int
3019SSL_state(const SSL *ssl) 3019SSL_state(const SSL *ssl)
3020{ 3020{
3021 return (S3I(ssl)->hs.state); 3021 return (ssl->s3->hs.state);
3022} 3022}
3023 3023
3024void 3024void
3025SSL_set_state(SSL *ssl, int state) 3025SSL_set_state(SSL *ssl, int state)
3026{ 3026{
3027 S3I(ssl)->hs.state = state; 3027 ssl->s3->hs.state = state;
3028} 3028}
3029 3029
3030void 3030void