diff options
Diffstat (limited to 'src/lib/libssl/ssl_pkt.c')
-rw-r--r-- | src/lib/libssl/ssl_pkt.c | 74 |
1 files changed, 37 insertions, 37 deletions
diff --git a/src/lib/libssl/ssl_pkt.c b/src/lib/libssl/ssl_pkt.c index 2fa7852b80..f354fb82bf 100644 --- a/src/lib/libssl/ssl_pkt.c +++ b/src/lib/libssl/ssl_pkt.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_pkt.c,v 1.5 2017/01/26 08:19:43 beck Exp $ */ | 1 | /* $OpenBSD: ssl_pkt.c,v 1.6 2017/01/26 10:40:21 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -224,7 +224,7 @@ ssl3_read_n(SSL *s, int n, int max, int extend) | |||
224 | 224 | ||
225 | if (n > (int)(rb->len - rb->offset)) { | 225 | if (n > (int)(rb->len - rb->offset)) { |
226 | /* does not happen */ | 226 | /* does not happen */ |
227 | SSLerr(SSL_F_SSL3_READ_N, ERR_R_INTERNAL_ERROR); | 227 | SSLerror(ERR_R_INTERNAL_ERROR); |
228 | return -1; | 228 | return -1; |
229 | } | 229 | } |
230 | 230 | ||
@@ -248,7 +248,7 @@ ssl3_read_n(SSL *s, int n, int max, int extend) | |||
248 | s->internal->rwstate = SSL_READING; | 248 | s->internal->rwstate = SSL_READING; |
249 | i = BIO_read(s->rbio, pkt + len + left, max - left); | 249 | i = BIO_read(s->rbio, pkt + len + left, max - left); |
250 | } else { | 250 | } else { |
251 | SSLerr(SSL_F_SSL3_READ_N, SSL_R_READ_BIO_NOT_SET); | 251 | SSLerror(SSL_R_READ_BIO_NOT_SET); |
252 | i = -1; | 252 | i = -1; |
253 | } | 253 | } |
254 | 254 | ||
@@ -364,7 +364,7 @@ ssl3_get_record(SSL *s) | |||
364 | if (!CBS_get_u8(&header, &type) || | 364 | if (!CBS_get_u8(&header, &type) || |
365 | !CBS_get_u16(&header, &ssl_version) || | 365 | !CBS_get_u16(&header, &ssl_version) || |
366 | !CBS_get_u16(&header, &len)) { | 366 | !CBS_get_u16(&header, &len)) { |
367 | SSLerr(SSL_F_SSL3_GET_RECORD, | 367 | SSLerror( |
368 | SSL_R_BAD_PACKET_LENGTH); | 368 | SSL_R_BAD_PACKET_LENGTH); |
369 | goto err; | 369 | goto err; |
370 | } | 370 | } |
@@ -374,7 +374,7 @@ ssl3_get_record(SSL *s) | |||
374 | 374 | ||
375 | /* Lets check version */ | 375 | /* Lets check version */ |
376 | if (!s->internal->first_packet && ssl_version != s->version) { | 376 | if (!s->internal->first_packet && ssl_version != s->version) { |
377 | SSLerr(SSL_F_SSL3_GET_RECORD, | 377 | SSLerror( |
378 | SSL_R_WRONG_VERSION_NUMBER); | 378 | SSL_R_WRONG_VERSION_NUMBER); |
379 | if ((s->version & 0xFF00) == (ssl_version & 0xFF00) && | 379 | if ((s->version & 0xFF00) == (ssl_version & 0xFF00) && |
380 | !s->internal->enc_write_ctx && !s->internal->write_hash) | 380 | !s->internal->enc_write_ctx && !s->internal->write_hash) |
@@ -385,14 +385,14 @@ ssl3_get_record(SSL *s) | |||
385 | } | 385 | } |
386 | 386 | ||
387 | if ((ssl_version >> 8) != SSL3_VERSION_MAJOR) { | 387 | if ((ssl_version >> 8) != SSL3_VERSION_MAJOR) { |
388 | SSLerr(SSL_F_SSL3_GET_RECORD, | 388 | SSLerror( |
389 | SSL_R_WRONG_VERSION_NUMBER); | 389 | SSL_R_WRONG_VERSION_NUMBER); |
390 | goto err; | 390 | goto err; |
391 | } | 391 | } |
392 | 392 | ||
393 | if (rr->length > s->s3->rbuf.len - SSL3_RT_HEADER_LENGTH) { | 393 | if (rr->length > s->s3->rbuf.len - SSL3_RT_HEADER_LENGTH) { |
394 | al = SSL_AD_RECORD_OVERFLOW; | 394 | al = SSL_AD_RECORD_OVERFLOW; |
395 | SSLerr(SSL_F_SSL3_GET_RECORD, | 395 | SSLerror( |
396 | SSL_R_PACKET_LENGTH_TOO_LONG); | 396 | SSL_R_PACKET_LENGTH_TOO_LONG); |
397 | goto f_err; | 397 | goto f_err; |
398 | } | 398 | } |
@@ -428,7 +428,7 @@ ssl3_get_record(SSL *s) | |||
428 | /* check is not needed I believe */ | 428 | /* check is not needed I believe */ |
429 | if (rr->length > SSL3_RT_MAX_ENCRYPTED_LENGTH) { | 429 | if (rr->length > SSL3_RT_MAX_ENCRYPTED_LENGTH) { |
430 | al = SSL_AD_RECORD_OVERFLOW; | 430 | al = SSL_AD_RECORD_OVERFLOW; |
431 | SSLerr(SSL_F_SSL3_GET_RECORD, SSL_R_ENCRYPTED_LENGTH_TOO_LONG); | 431 | SSLerror(SSL_R_ENCRYPTED_LENGTH_TOO_LONG); |
432 | goto f_err; | 432 | goto f_err; |
433 | } | 433 | } |
434 | 434 | ||
@@ -442,7 +442,7 @@ ssl3_get_record(SSL *s) | |||
442 | * -1: if the padding is invalid */ | 442 | * -1: if the padding is invalid */ |
443 | if (enc_err == 0) { | 443 | if (enc_err == 0) { |
444 | al = SSL_AD_DECRYPTION_FAILED; | 444 | al = SSL_AD_DECRYPTION_FAILED; |
445 | SSLerr(SSL_F_SSL3_GET_RECORD, SSL_R_BLOCK_CIPHER_PAD_IS_WRONG); | 445 | SSLerror(SSL_R_BLOCK_CIPHER_PAD_IS_WRONG); |
446 | goto f_err; | 446 | goto f_err; |
447 | } | 447 | } |
448 | 448 | ||
@@ -470,7 +470,7 @@ ssl3_get_record(SSL *s) | |||
470 | (EVP_CIPHER_CTX_mode(s->enc_read_ctx) == EVP_CIPH_CBC_MODE && | 470 | (EVP_CIPHER_CTX_mode(s->enc_read_ctx) == EVP_CIPH_CBC_MODE && |
471 | orig_len < mac_size + 1)) { | 471 | orig_len < mac_size + 1)) { |
472 | al = SSL_AD_DECODE_ERROR; | 472 | al = SSL_AD_DECODE_ERROR; |
473 | SSLerr(SSL_F_SSL3_GET_RECORD, SSL_R_LENGTH_TOO_SHORT); | 473 | SSLerror(SSL_R_LENGTH_TOO_SHORT); |
474 | goto f_err; | 474 | goto f_err; |
475 | } | 475 | } |
476 | 476 | ||
@@ -510,14 +510,14 @@ ssl3_get_record(SSL *s) | |||
510 | * (e.g. via a logfile) | 510 | * (e.g. via a logfile) |
511 | */ | 511 | */ |
512 | al = SSL_AD_BAD_RECORD_MAC; | 512 | al = SSL_AD_BAD_RECORD_MAC; |
513 | SSLerr(SSL_F_SSL3_GET_RECORD, | 513 | SSLerror( |
514 | SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC); | 514 | SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC); |
515 | goto f_err; | 515 | goto f_err; |
516 | } | 516 | } |
517 | 517 | ||
518 | if (rr->length > SSL3_RT_MAX_PLAIN_LENGTH) { | 518 | if (rr->length > SSL3_RT_MAX_PLAIN_LENGTH) { |
519 | al = SSL_AD_RECORD_OVERFLOW; | 519 | al = SSL_AD_RECORD_OVERFLOW; |
520 | SSLerr(SSL_F_SSL3_GET_RECORD, SSL_R_DATA_LENGTH_TOO_LONG); | 520 | SSLerror(SSL_R_DATA_LENGTH_TOO_LONG); |
521 | goto f_err; | 521 | goto f_err; |
522 | } | 522 | } |
523 | 523 | ||
@@ -543,7 +543,7 @@ ssl3_get_record(SSL *s) | |||
543 | * empty record without forcing want_read. | 543 | * empty record without forcing want_read. |
544 | */ | 544 | */ |
545 | if (s->internal->empty_record_count++ > SSL_MAX_EMPTY_RECORDS) { | 545 | if (s->internal->empty_record_count++ > SSL_MAX_EMPTY_RECORDS) { |
546 | SSLerr(SSL_F_SSL3_GET_RECORD, | 546 | SSLerror( |
547 | SSL_R_PEER_BEHAVING_BADLY); | 547 | SSL_R_PEER_BEHAVING_BADLY); |
548 | return -1; | 548 | return -1; |
549 | } | 549 | } |
@@ -575,7 +575,7 @@ ssl3_write_bytes(SSL *s, int type, const void *buf_, int len) | |||
575 | int i; | 575 | int i; |
576 | 576 | ||
577 | if (len < 0) { | 577 | if (len < 0) { |
578 | SSLerr(SSL_F_SSL3_WRITE_BYTES, ERR_R_INTERNAL_ERROR); | 578 | SSLerror(ERR_R_INTERNAL_ERROR); |
579 | return -1; | 579 | return -1; |
580 | } | 580 | } |
581 | 581 | ||
@@ -588,7 +588,7 @@ ssl3_write_bytes(SSL *s, int type, const void *buf_, int len) | |||
588 | if (i < 0) | 588 | if (i < 0) |
589 | return (i); | 589 | return (i); |
590 | if (i == 0) { | 590 | if (i == 0) { |
591 | SSLerr(SSL_F_SSL3_WRITE_BYTES, | 591 | SSLerror( |
592 | SSL_R_SSL_HANDSHAKE_FAILURE); | 592 | SSL_R_SSL_HANDSHAKE_FAILURE); |
593 | return -1; | 593 | return -1; |
594 | } | 594 | } |
@@ -698,7 +698,7 @@ do_ssl3_write(SSL *s, int type, const unsigned char *buf, | |||
698 | if (prefix_len > | 698 | if (prefix_len > |
699 | (SSL3_RT_HEADER_LENGTH + SSL3_RT_SEND_MAX_ENCRYPTED_OVERHEAD)) { | 699 | (SSL3_RT_HEADER_LENGTH + SSL3_RT_SEND_MAX_ENCRYPTED_OVERHEAD)) { |
700 | /* insufficient space */ | 700 | /* insufficient space */ |
701 | SSLerr(SSL_F_DO_SSL3_WRITE, | 701 | SSLerror( |
702 | ERR_R_INTERNAL_ERROR); | 702 | ERR_R_INTERNAL_ERROR); |
703 | goto err; | 703 | goto err; |
704 | } | 704 | } |
@@ -842,7 +842,7 @@ ssl3_write_pending(SSL *s, int type, const unsigned char *buf, unsigned int len) | |||
842 | if ((S3I(s)->wpend_tot > (int)len) || ((S3I(s)->wpend_buf != buf) && | 842 | if ((S3I(s)->wpend_tot > (int)len) || ((S3I(s)->wpend_buf != buf) && |
843 | !(s->internal->mode & SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER)) || | 843 | !(s->internal->mode & SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER)) || |
844 | (S3I(s)->wpend_type != type)) { | 844 | (S3I(s)->wpend_type != type)) { |
845 | SSLerr(SSL_F_SSL3_WRITE_PENDING, SSL_R_BAD_WRITE_RETRY); | 845 | SSLerror(SSL_R_BAD_WRITE_RETRY); |
846 | return (-1); | 846 | return (-1); |
847 | } | 847 | } |
848 | 848 | ||
@@ -854,7 +854,7 @@ ssl3_write_pending(SSL *s, int type, const unsigned char *buf, unsigned int len) | |||
854 | (char *)&(wb->buf[wb->offset]), | 854 | (char *)&(wb->buf[wb->offset]), |
855 | (unsigned int)wb->left); | 855 | (unsigned int)wb->left); |
856 | } else { | 856 | } else { |
857 | SSLerr(SSL_F_SSL3_WRITE_PENDING, SSL_R_BIO_NOT_SET); | 857 | SSLerror(SSL_R_BIO_NOT_SET); |
858 | i = -1; | 858 | i = -1; |
859 | } | 859 | } |
860 | if (i == wb->left) { | 860 | if (i == wb->left) { |
@@ -919,14 +919,14 @@ ssl3_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek) | |||
919 | return (-1); | 919 | return (-1); |
920 | 920 | ||
921 | if (len < 0) { | 921 | if (len < 0) { |
922 | SSLerr(SSL_F_SSL3_READ_BYTES, ERR_R_INTERNAL_ERROR); | 922 | SSLerror(ERR_R_INTERNAL_ERROR); |
923 | return -1; | 923 | return -1; |
924 | } | 924 | } |
925 | 925 | ||
926 | if ((type && type != SSL3_RT_APPLICATION_DATA && | 926 | if ((type && type != SSL3_RT_APPLICATION_DATA && |
927 | type != SSL3_RT_HANDSHAKE) || | 927 | type != SSL3_RT_HANDSHAKE) || |
928 | (peek && (type != SSL3_RT_APPLICATION_DATA))) { | 928 | (peek && (type != SSL3_RT_APPLICATION_DATA))) { |
929 | SSLerr(SSL_F_SSL3_READ_BYTES, ERR_R_INTERNAL_ERROR); | 929 | SSLerror(ERR_R_INTERNAL_ERROR); |
930 | return -1; | 930 | return -1; |
931 | } | 931 | } |
932 | 932 | ||
@@ -961,7 +961,7 @@ ssl3_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek) | |||
961 | if (i < 0) | 961 | if (i < 0) |
962 | return (i); | 962 | return (i); |
963 | if (i == 0) { | 963 | if (i == 0) { |
964 | SSLerr(SSL_F_SSL3_READ_BYTES, | 964 | SSLerror( |
965 | SSL_R_SSL_HANDSHAKE_FAILURE); | 965 | SSL_R_SSL_HANDSHAKE_FAILURE); |
966 | return (-1); | 966 | return (-1); |
967 | } | 967 | } |
@@ -1004,7 +1004,7 @@ start: | |||
1004 | * reset by ssl3_get_finished */ | 1004 | * reset by ssl3_get_finished */ |
1005 | && (rr->type != SSL3_RT_HANDSHAKE)) { | 1005 | && (rr->type != SSL3_RT_HANDSHAKE)) { |
1006 | al = SSL_AD_UNEXPECTED_MESSAGE; | 1006 | al = SSL_AD_UNEXPECTED_MESSAGE; |
1007 | SSLerr(SSL_F_SSL3_READ_BYTES, | 1007 | SSLerror( |
1008 | SSL_R_DATA_BETWEEN_CCS_AND_FINISHED); | 1008 | SSL_R_DATA_BETWEEN_CCS_AND_FINISHED); |
1009 | goto f_err; | 1009 | goto f_err; |
1010 | } | 1010 | } |
@@ -1025,7 +1025,7 @@ start: | |||
1025 | if (SSL_in_init(s) && (type == SSL3_RT_APPLICATION_DATA) && | 1025 | if (SSL_in_init(s) && (type == SSL3_RT_APPLICATION_DATA) && |
1026 | (s->enc_read_ctx == NULL)) { | 1026 | (s->enc_read_ctx == NULL)) { |
1027 | al = SSL_AD_UNEXPECTED_MESSAGE; | 1027 | al = SSL_AD_UNEXPECTED_MESSAGE; |
1028 | SSLerr(SSL_F_SSL3_READ_BYTES, | 1028 | SSLerror( |
1029 | SSL_R_APP_DATA_IN_HANDSHAKE); | 1029 | SSL_R_APP_DATA_IN_HANDSHAKE); |
1030 | goto f_err; | 1030 | goto f_err; |
1031 | } | 1031 | } |
@@ -1108,7 +1108,7 @@ start: | |||
1108 | (S3I(s)->handshake_fragment[2] != 0) || | 1108 | (S3I(s)->handshake_fragment[2] != 0) || |
1109 | (S3I(s)->handshake_fragment[3] != 0)) { | 1109 | (S3I(s)->handshake_fragment[3] != 0)) { |
1110 | al = SSL_AD_DECODE_ERROR; | 1110 | al = SSL_AD_DECODE_ERROR; |
1111 | SSLerr(SSL_F_SSL3_READ_BYTES, SSL_R_BAD_HELLO_REQUEST); | 1111 | SSLerror(SSL_R_BAD_HELLO_REQUEST); |
1112 | goto f_err; | 1112 | goto f_err; |
1113 | } | 1113 | } |
1114 | 1114 | ||
@@ -1126,7 +1126,7 @@ start: | |||
1126 | if (i < 0) | 1126 | if (i < 0) |
1127 | return (i); | 1127 | return (i); |
1128 | if (i == 0) { | 1128 | if (i == 0) { |
1129 | SSLerr(SSL_F_SSL3_READ_BYTES, | 1129 | SSLerror( |
1130 | SSL_R_SSL_HANDSHAKE_FAILURE); | 1130 | SSL_R_SSL_HANDSHAKE_FAILURE); |
1131 | return (-1); | 1131 | return (-1); |
1132 | } | 1132 | } |
@@ -1200,14 +1200,14 @@ start: | |||
1200 | */ | 1200 | */ |
1201 | else if (alert_descr == SSL_AD_NO_RENEGOTIATION) { | 1201 | else if (alert_descr == SSL_AD_NO_RENEGOTIATION) { |
1202 | al = SSL_AD_HANDSHAKE_FAILURE; | 1202 | al = SSL_AD_HANDSHAKE_FAILURE; |
1203 | SSLerr(SSL_F_SSL3_READ_BYTES, | 1203 | SSLerror( |
1204 | SSL_R_NO_RENEGOTIATION); | 1204 | SSL_R_NO_RENEGOTIATION); |
1205 | goto f_err; | 1205 | goto f_err; |
1206 | } | 1206 | } |
1207 | } else if (alert_level == SSL3_AL_FATAL) { | 1207 | } else if (alert_level == SSL3_AL_FATAL) { |
1208 | s->internal->rwstate = SSL_NOTHING; | 1208 | s->internal->rwstate = SSL_NOTHING; |
1209 | S3I(s)->fatal_alert = alert_descr; | 1209 | S3I(s)->fatal_alert = alert_descr; |
1210 | SSLerr(SSL_F_SSL3_READ_BYTES, | 1210 | SSLerror( |
1211 | SSL_AD_REASON_OFFSET + alert_descr); | 1211 | SSL_AD_REASON_OFFSET + alert_descr); |
1212 | ERR_asprintf_error_data("SSL alert number %d", | 1212 | ERR_asprintf_error_data("SSL alert number %d", |
1213 | alert_descr); | 1213 | alert_descr); |
@@ -1216,7 +1216,7 @@ start: | |||
1216 | return (0); | 1216 | return (0); |
1217 | } else { | 1217 | } else { |
1218 | al = SSL_AD_ILLEGAL_PARAMETER; | 1218 | al = SSL_AD_ILLEGAL_PARAMETER; |
1219 | SSLerr(SSL_F_SSL3_READ_BYTES, SSL_R_UNKNOWN_ALERT_TYPE); | 1219 | SSLerror(SSL_R_UNKNOWN_ALERT_TYPE); |
1220 | goto f_err; | 1220 | goto f_err; |
1221 | } | 1221 | } |
1222 | 1222 | ||
@@ -1236,7 +1236,7 @@ start: | |||
1236 | if ((rr->length != 1) || (rr->off != 0) || | 1236 | if ((rr->length != 1) || (rr->off != 0) || |
1237 | (rr->data[0] != SSL3_MT_CCS)) { | 1237 | (rr->data[0] != SSL3_MT_CCS)) { |
1238 | al = SSL_AD_ILLEGAL_PARAMETER; | 1238 | al = SSL_AD_ILLEGAL_PARAMETER; |
1239 | SSLerr(SSL_F_SSL3_READ_BYTES, | 1239 | SSLerror( |
1240 | SSL_R_BAD_CHANGE_CIPHER_SPEC); | 1240 | SSL_R_BAD_CHANGE_CIPHER_SPEC); |
1241 | goto f_err; | 1241 | goto f_err; |
1242 | } | 1242 | } |
@@ -1244,7 +1244,7 @@ start: | |||
1244 | /* Check we have a cipher to change to */ | 1244 | /* Check we have a cipher to change to */ |
1245 | if (S3I(s)->tmp.new_cipher == NULL) { | 1245 | if (S3I(s)->tmp.new_cipher == NULL) { |
1246 | al = SSL_AD_UNEXPECTED_MESSAGE; | 1246 | al = SSL_AD_UNEXPECTED_MESSAGE; |
1247 | SSLerr(SSL_F_SSL3_READ_BYTES, | 1247 | SSLerror( |
1248 | SSL_R_CCS_RECEIVED_EARLY); | 1248 | SSL_R_CCS_RECEIVED_EARLY); |
1249 | goto f_err; | 1249 | goto f_err; |
1250 | } | 1250 | } |
@@ -1252,7 +1252,7 @@ start: | |||
1252 | /* Check that we should be receiving a Change Cipher Spec. */ | 1252 | /* Check that we should be receiving a Change Cipher Spec. */ |
1253 | if (!(s->s3->flags & SSL3_FLAGS_CCS_OK)) { | 1253 | if (!(s->s3->flags & SSL3_FLAGS_CCS_OK)) { |
1254 | al = SSL_AD_UNEXPECTED_MESSAGE; | 1254 | al = SSL_AD_UNEXPECTED_MESSAGE; |
1255 | SSLerr(SSL_F_SSL3_READ_BYTES, | 1255 | SSLerror( |
1256 | SSL_R_CCS_RECEIVED_EARLY); | 1256 | SSL_R_CCS_RECEIVED_EARLY); |
1257 | goto f_err; | 1257 | goto f_err; |
1258 | } | 1258 | } |
@@ -1285,7 +1285,7 @@ start: | |||
1285 | if (i < 0) | 1285 | if (i < 0) |
1286 | return (i); | 1286 | return (i); |
1287 | if (i == 0) { | 1287 | if (i == 0) { |
1288 | SSLerr(SSL_F_SSL3_READ_BYTES, | 1288 | SSLerror( |
1289 | SSL_R_SSL_HANDSHAKE_FAILURE); | 1289 | SSL_R_SSL_HANDSHAKE_FAILURE); |
1290 | return (-1); | 1290 | return (-1); |
1291 | } | 1291 | } |
@@ -1315,7 +1315,7 @@ start: | |||
1315 | goto start; | 1315 | goto start; |
1316 | } | 1316 | } |
1317 | al = SSL_AD_UNEXPECTED_MESSAGE; | 1317 | al = SSL_AD_UNEXPECTED_MESSAGE; |
1318 | SSLerr(SSL_F_SSL3_READ_BYTES, SSL_R_UNEXPECTED_RECORD); | 1318 | SSLerror(SSL_R_UNEXPECTED_RECORD); |
1319 | goto f_err; | 1319 | goto f_err; |
1320 | case SSL3_RT_CHANGE_CIPHER_SPEC: | 1320 | case SSL3_RT_CHANGE_CIPHER_SPEC: |
1321 | case SSL3_RT_ALERT: | 1321 | case SSL3_RT_ALERT: |
@@ -1324,7 +1324,7 @@ start: | |||
1324 | * of SSL3_RT_HANDSHAKE when s->internal->in_handshake is set, but that | 1324 | * of SSL3_RT_HANDSHAKE when s->internal->in_handshake is set, but that |
1325 | * should not happen when type != rr->type */ | 1325 | * should not happen when type != rr->type */ |
1326 | al = SSL_AD_UNEXPECTED_MESSAGE; | 1326 | al = SSL_AD_UNEXPECTED_MESSAGE; |
1327 | SSLerr(SSL_F_SSL3_READ_BYTES, ERR_R_INTERNAL_ERROR); | 1327 | SSLerror(ERR_R_INTERNAL_ERROR); |
1328 | goto f_err; | 1328 | goto f_err; |
1329 | case SSL3_RT_APPLICATION_DATA: | 1329 | case SSL3_RT_APPLICATION_DATA: |
1330 | /* At this point, we were expecting handshake data, | 1330 | /* At this point, we were expecting handshake data, |
@@ -1346,7 +1346,7 @@ start: | |||
1346 | return (-1); | 1346 | return (-1); |
1347 | } else { | 1347 | } else { |
1348 | al = SSL_AD_UNEXPECTED_MESSAGE; | 1348 | al = SSL_AD_UNEXPECTED_MESSAGE; |
1349 | SSLerr(SSL_F_SSL3_READ_BYTES, SSL_R_UNEXPECTED_RECORD); | 1349 | SSLerror(SSL_R_UNEXPECTED_RECORD); |
1350 | goto f_err; | 1350 | goto f_err; |
1351 | } | 1351 | } |
1352 | } | 1352 | } |
@@ -1373,7 +1373,7 @@ ssl3_do_change_cipher_spec(SSL *s) | |||
1373 | if (S3I(s)->tmp.key_block == NULL) { | 1373 | if (S3I(s)->tmp.key_block == NULL) { |
1374 | if (s->session == NULL || s->session->master_key_length == 0) { | 1374 | if (s->session == NULL || s->session->master_key_length == 0) { |
1375 | /* might happen if dtls1_read_bytes() calls this */ | 1375 | /* might happen if dtls1_read_bytes() calls this */ |
1376 | SSLerr(SSL_F_SSL3_DO_CHANGE_CIPHER_SPEC, | 1376 | SSLerror( |
1377 | SSL_R_CCS_RECEIVED_EARLY); | 1377 | SSL_R_CCS_RECEIVED_EARLY); |
1378 | return (0); | 1378 | return (0); |
1379 | } | 1379 | } |
@@ -1400,7 +1400,7 @@ ssl3_do_change_cipher_spec(SSL *s) | |||
1400 | i = tls1_final_finish_mac(s, sender, slen, | 1400 | i = tls1_final_finish_mac(s, sender, slen, |
1401 | S3I(s)->tmp.peer_finish_md); | 1401 | S3I(s)->tmp.peer_finish_md); |
1402 | if (i == 0) { | 1402 | if (i == 0) { |
1403 | SSLerr(SSL_F_SSL3_DO_CHANGE_CIPHER_SPEC, ERR_R_INTERNAL_ERROR); | 1403 | SSLerror(ERR_R_INTERNAL_ERROR); |
1404 | return 0; | 1404 | return 0; |
1405 | } | 1405 | } |
1406 | S3I(s)->tmp.peer_finish_md_len = i; | 1406 | S3I(s)->tmp.peer_finish_md_len = i; |