diff options
Diffstat (limited to 'src/lib/libssl/ssl_lib.c')
-rw-r--r-- | src/lib/libssl/ssl_lib.c | 26 |
1 files changed, 13 insertions, 13 deletions
diff --git a/src/lib/libssl/ssl_lib.c b/src/lib/libssl/ssl_lib.c index 4fe7fb58dc..64b1806238 100644 --- a/src/lib/libssl/ssl_lib.c +++ b/src/lib/libssl/ssl_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_lib.c,v 1.281 2022/01/07 16:45:06 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_lib.c,v 1.282 2022/01/08 12:43:44 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -912,7 +912,7 @@ SSL_get0_verified_chain(const SSL *s) | |||
912 | int | 912 | int |
913 | SSL_copy_session_id(SSL *t, const SSL *f) | 913 | SSL_copy_session_id(SSL *t, const SSL *f) |
914 | { | 914 | { |
915 | CERT *tmp; | 915 | SSL_CERT *tmp; |
916 | 916 | ||
917 | /* Do we need to do SSL locking? */ | 917 | /* Do we need to do SSL locking? */ |
918 | if (!SSL_set_session(t, SSL_get_session(f))) | 918 | if (!SSL_set_session(t, SSL_get_session(f))) |
@@ -2187,10 +2187,10 @@ SSL_CTX_set_verify_depth(SSL_CTX *ctx, int depth) | |||
2187 | } | 2187 | } |
2188 | 2188 | ||
2189 | void | 2189 | void |
2190 | ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) | 2190 | ssl_set_cert_masks(SSL_CERT *c, const SSL_CIPHER *cipher) |
2191 | { | 2191 | { |
2192 | unsigned long mask_a, mask_k; | 2192 | unsigned long mask_a, mask_k; |
2193 | CERT_PKEY *cpk; | 2193 | SSL_CERT_PKEY *cpk; |
2194 | 2194 | ||
2195 | if (c == NULL) | 2195 | if (c == NULL) |
2196 | return; | 2196 | return; |
@@ -2259,12 +2259,12 @@ ssl_check_srvr_ecc_cert_and_alg(X509 *x, SSL *s) | |||
2259 | return (1); | 2259 | return (1); |
2260 | } | 2260 | } |
2261 | 2261 | ||
2262 | CERT_PKEY * | 2262 | SSL_CERT_PKEY * |
2263 | ssl_get_server_send_pkey(const SSL *s) | 2263 | ssl_get_server_send_pkey(const SSL *s) |
2264 | { | 2264 | { |
2265 | unsigned long alg_a; | 2265 | unsigned long alg_a; |
2266 | CERT *c; | 2266 | SSL_CERT *c; |
2267 | int i; | 2267 | int i; |
2268 | 2268 | ||
2269 | c = s->cert; | 2269 | c = s->cert; |
2270 | ssl_set_cert_masks(c, S3I(s)->hs.cipher); | 2270 | ssl_set_cert_masks(c, S3I(s)->hs.cipher); |
@@ -2291,9 +2291,9 @@ ssl_get_sign_pkey(SSL *s, const SSL_CIPHER *cipher, const EVP_MD **pmd, | |||
2291 | { | 2291 | { |
2292 | const struct ssl_sigalg *sigalg = NULL; | 2292 | const struct ssl_sigalg *sigalg = NULL; |
2293 | EVP_PKEY *pkey = NULL; | 2293 | EVP_PKEY *pkey = NULL; |
2294 | unsigned long alg_a; | 2294 | unsigned long alg_a; |
2295 | CERT *c; | 2295 | SSL_CERT *c; |
2296 | int idx = -1; | 2296 | int idx = -1; |
2297 | 2297 | ||
2298 | alg_a = cipher->algorithm_auth; | 2298 | alg_a = cipher->algorithm_auth; |
2299 | c = s->cert; | 2299 | c = s->cert; |
@@ -2322,7 +2322,7 @@ ssl_get_sign_pkey(SSL *s, const SSL_CIPHER *cipher, const EVP_MD **pmd, | |||
2322 | size_t | 2322 | size_t |
2323 | ssl_dhe_params_auto_key_bits(SSL *s) | 2323 | ssl_dhe_params_auto_key_bits(SSL *s) |
2324 | { | 2324 | { |
2325 | CERT_PKEY *cpk; | 2325 | SSL_CERT_PKEY *cpk; |
2326 | int key_bits; | 2326 | int key_bits; |
2327 | 2327 | ||
2328 | if (s->cert->dhe_params_auto == 2) { | 2328 | if (s->cert->dhe_params_auto == 2) { |
@@ -2974,7 +2974,7 @@ SSL_get_SSL_CTX(const SSL *ssl) | |||
2974 | SSL_CTX * | 2974 | SSL_CTX * |
2975 | SSL_set_SSL_CTX(SSL *ssl, SSL_CTX* ctx) | 2975 | SSL_set_SSL_CTX(SSL *ssl, SSL_CTX* ctx) |
2976 | { | 2976 | { |
2977 | CERT *new_cert; | 2977 | SSL_CERT *new_cert; |
2978 | 2978 | ||
2979 | if (ctx == NULL) | 2979 | if (ctx == NULL) |
2980 | ctx = ssl->initial_ctx; | 2980 | ctx = ssl->initial_ctx; |