diff options
Diffstat (limited to 'src/lib/libssl/ssl_sigalgs.c')
| -rw-r--r-- | src/lib/libssl/ssl_sigalgs.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/src/lib/libssl/ssl_sigalgs.c b/src/lib/libssl/ssl_sigalgs.c index fd96317fde..daf735a8ff 100644 --- a/src/lib/libssl/ssl_sigalgs.c +++ b/src/lib/libssl/ssl_sigalgs.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_sigalgs.c,v 1.40 2022/01/20 20:37:33 tb Exp $ */ | 1 | /* $OpenBSD: ssl_sigalgs.c,v 1.41 2022/02/05 14:54:10 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2018-2020 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2018-2020 Bob Beck <beck@openbsd.org> |
| 4 | * Copyright (c) 2021 Joel Sing <jsing@openbsd.org> | 4 | * Copyright (c) 2021 Joel Sing <jsing@openbsd.org> |
| @@ -209,7 +209,7 @@ ssl_sigalg_from_value(SSL *s, uint16_t value) | |||
| 209 | size_t len; | 209 | size_t len; |
| 210 | int i; | 210 | int i; |
| 211 | 211 | ||
| 212 | ssl_sigalgs_for_version(S3I(s)->hs.negotiated_tls_version, | 212 | ssl_sigalgs_for_version(s->s3->hs.negotiated_tls_version, |
| 213 | &values, &len); | 213 | &values, &len); |
| 214 | 214 | ||
| 215 | for (i = 0; i < len; i++) { | 215 | for (i = 0; i < len; i++) { |
| @@ -248,7 +248,7 @@ ssl_sigalg_for_legacy(SSL *s, EVP_PKEY *pkey) | |||
| 248 | /* Default signature algorithms used for TLSv1.2 and earlier. */ | 248 | /* Default signature algorithms used for TLSv1.2 and earlier. */ |
| 249 | switch (EVP_PKEY_id(pkey)) { | 249 | switch (EVP_PKEY_id(pkey)) { |
| 250 | case EVP_PKEY_RSA: | 250 | case EVP_PKEY_RSA: |
| 251 | if (S3I(s)->hs.negotiated_tls_version < TLS1_2_VERSION) | 251 | if (s->s3->hs.negotiated_tls_version < TLS1_2_VERSION) |
| 252 | return ssl_sigalg_lookup(SIGALG_RSA_PKCS1_MD5_SHA1); | 252 | return ssl_sigalg_lookup(SIGALG_RSA_PKCS1_MD5_SHA1); |
| 253 | return ssl_sigalg_lookup(SIGALG_RSA_PKCS1_SHA1); | 253 | return ssl_sigalg_lookup(SIGALG_RSA_PKCS1_SHA1); |
| 254 | case EVP_PKEY_EC: | 254 | case EVP_PKEY_EC: |
| @@ -277,7 +277,7 @@ ssl_sigalg_pkey_ok(SSL *s, const struct ssl_sigalg *sigalg, EVP_PKEY *pkey) | |||
| 277 | return 0; | 277 | return 0; |
| 278 | } | 278 | } |
| 279 | 279 | ||
| 280 | if (S3I(s)->hs.negotiated_tls_version < TLS1_3_VERSION) | 280 | if (s->s3->hs.negotiated_tls_version < TLS1_3_VERSION) |
| 281 | return 1; | 281 | return 1; |
| 282 | 282 | ||
| 283 | /* RSA cannot be used without PSS in TLSv1.3. */ | 283 | /* RSA cannot be used without PSS in TLSv1.3. */ |
| @@ -309,14 +309,14 @@ ssl_sigalg_select(SSL *s, EVP_PKEY *pkey) | |||
| 309 | * RFC 5246 allows a TLS 1.2 client to send no sigalgs extension, | 309 | * RFC 5246 allows a TLS 1.2 client to send no sigalgs extension, |
| 310 | * in which case the server must use the default. | 310 | * in which case the server must use the default. |
| 311 | */ | 311 | */ |
| 312 | if (S3I(s)->hs.negotiated_tls_version < TLS1_3_VERSION && | 312 | if (s->s3->hs.negotiated_tls_version < TLS1_3_VERSION && |
| 313 | S3I(s)->hs.sigalgs == NULL) | 313 | s->s3->hs.sigalgs == NULL) |
| 314 | return ssl_sigalg_for_legacy(s, pkey); | 314 | return ssl_sigalg_for_legacy(s, pkey); |
| 315 | 315 | ||
| 316 | /* | 316 | /* |
| 317 | * If we get here, we have client or server sent sigalgs, use one. | 317 | * If we get here, we have client or server sent sigalgs, use one. |
| 318 | */ | 318 | */ |
| 319 | CBS_init(&cbs, S3I(s)->hs.sigalgs, S3I(s)->hs.sigalgs_len); | 319 | CBS_init(&cbs, s->s3->hs.sigalgs, s->s3->hs.sigalgs_len); |
| 320 | while (CBS_len(&cbs) > 0) { | 320 | while (CBS_len(&cbs) > 0) { |
| 321 | const struct ssl_sigalg *sigalg; | 321 | const struct ssl_sigalg *sigalg; |
| 322 | uint16_t sigalg_value; | 322 | uint16_t sigalg_value; |
