summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_lib.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/ssl_lib.c')
-rw-r--r--src/lib/libssl/ssl_lib.c26
1 files changed, 13 insertions, 13 deletions
diff --git a/src/lib/libssl/ssl_lib.c b/src/lib/libssl/ssl_lib.c
index 4fe7fb58dc..64b1806238 100644
--- a/src/lib/libssl/ssl_lib.c
+++ b/src/lib/libssl/ssl_lib.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_lib.c,v 1.281 2022/01/07 16:45:06 jsing Exp $ */ 1/* $OpenBSD: ssl_lib.c,v 1.282 2022/01/08 12:43:44 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -912,7 +912,7 @@ SSL_get0_verified_chain(const SSL *s)
912int 912int
913SSL_copy_session_id(SSL *t, const SSL *f) 913SSL_copy_session_id(SSL *t, const SSL *f)
914{ 914{
915 CERT *tmp; 915 SSL_CERT *tmp;
916 916
917 /* Do we need to do SSL locking? */ 917 /* Do we need to do SSL locking? */
918 if (!SSL_set_session(t, SSL_get_session(f))) 918 if (!SSL_set_session(t, SSL_get_session(f)))
@@ -2187,10 +2187,10 @@ SSL_CTX_set_verify_depth(SSL_CTX *ctx, int depth)
2187} 2187}
2188 2188
2189void 2189void
2190ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) 2190ssl_set_cert_masks(SSL_CERT *c, const SSL_CIPHER *cipher)
2191{ 2191{
2192 unsigned long mask_a, mask_k; 2192 unsigned long mask_a, mask_k;
2193 CERT_PKEY *cpk; 2193 SSL_CERT_PKEY *cpk;
2194 2194
2195 if (c == NULL) 2195 if (c == NULL)
2196 return; 2196 return;
@@ -2259,12 +2259,12 @@ ssl_check_srvr_ecc_cert_and_alg(X509 *x, SSL *s)
2259 return (1); 2259 return (1);
2260} 2260}
2261 2261
2262CERT_PKEY * 2262SSL_CERT_PKEY *
2263ssl_get_server_send_pkey(const SSL *s) 2263ssl_get_server_send_pkey(const SSL *s)
2264{ 2264{
2265 unsigned long alg_a; 2265 unsigned long alg_a;
2266 CERT *c; 2266 SSL_CERT *c;
2267 int i; 2267 int i;
2268 2268
2269 c = s->cert; 2269 c = s->cert;
2270 ssl_set_cert_masks(c, S3I(s)->hs.cipher); 2270 ssl_set_cert_masks(c, S3I(s)->hs.cipher);
@@ -2291,9 +2291,9 @@ ssl_get_sign_pkey(SSL *s, const SSL_CIPHER *cipher, const EVP_MD **pmd,
2291{ 2291{
2292 const struct ssl_sigalg *sigalg = NULL; 2292 const struct ssl_sigalg *sigalg = NULL;
2293 EVP_PKEY *pkey = NULL; 2293 EVP_PKEY *pkey = NULL;
2294 unsigned long alg_a; 2294 unsigned long alg_a;
2295 CERT *c; 2295 SSL_CERT *c;
2296 int idx = -1; 2296 int idx = -1;
2297 2297
2298 alg_a = cipher->algorithm_auth; 2298 alg_a = cipher->algorithm_auth;
2299 c = s->cert; 2299 c = s->cert;
@@ -2322,7 +2322,7 @@ ssl_get_sign_pkey(SSL *s, const SSL_CIPHER *cipher, const EVP_MD **pmd,
2322size_t 2322size_t
2323ssl_dhe_params_auto_key_bits(SSL *s) 2323ssl_dhe_params_auto_key_bits(SSL *s)
2324{ 2324{
2325 CERT_PKEY *cpk; 2325 SSL_CERT_PKEY *cpk;
2326 int key_bits; 2326 int key_bits;
2327 2327
2328 if (s->cert->dhe_params_auto == 2) { 2328 if (s->cert->dhe_params_auto == 2) {
@@ -2974,7 +2974,7 @@ SSL_get_SSL_CTX(const SSL *ssl)
2974SSL_CTX * 2974SSL_CTX *
2975SSL_set_SSL_CTX(SSL *ssl, SSL_CTX* ctx) 2975SSL_set_SSL_CTX(SSL *ssl, SSL_CTX* ctx)
2976{ 2976{
2977 CERT *new_cert; 2977 SSL_CERT *new_cert;
2978 2978
2979 if (ctx == NULL) 2979 if (ctx == NULL)
2980 ctx = ssl->initial_ctx; 2980 ctx = ssl->initial_ctx;