diff options
Diffstat (limited to 'src/lib/libssl/ssl_srvr.c')
| -rw-r--r-- | src/lib/libssl/ssl_srvr.c | 34 |
1 files changed, 17 insertions, 17 deletions
diff --git a/src/lib/libssl/ssl_srvr.c b/src/lib/libssl/ssl_srvr.c index 3dc87a00c8..047087c1c9 100644 --- a/src/lib/libssl/ssl_srvr.c +++ b/src/lib/libssl/ssl_srvr.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_srvr.c,v 1.98 2021/03/24 18:40:03 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_srvr.c,v 1.99 2021/03/24 18:44:00 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -394,7 +394,7 @@ ssl3_accept(SSL *s) | |||
| 394 | case SSL3_ST_SW_CERT_A: | 394 | case SSL3_ST_SW_CERT_A: |
| 395 | case SSL3_ST_SW_CERT_B: | 395 | case SSL3_ST_SW_CERT_B: |
| 396 | /* Check if it is anon DH or anon ECDH. */ | 396 | /* Check if it is anon DH or anon ECDH. */ |
| 397 | if (!(S3I(s)->hs.new_cipher->algorithm_auth & | 397 | if (!(S3I(s)->hs.cipher->algorithm_auth & |
| 398 | SSL_aNULL)) { | 398 | SSL_aNULL)) { |
| 399 | if (SSL_is_dtls(s)) | 399 | if (SSL_is_dtls(s)) |
| 400 | dtls1_start_timer(s); | 400 | dtls1_start_timer(s); |
| @@ -414,7 +414,7 @@ ssl3_accept(SSL *s) | |||
| 414 | 414 | ||
| 415 | case SSL3_ST_SW_KEY_EXCH_A: | 415 | case SSL3_ST_SW_KEY_EXCH_A: |
| 416 | case SSL3_ST_SW_KEY_EXCH_B: | 416 | case SSL3_ST_SW_KEY_EXCH_B: |
| 417 | alg_k = S3I(s)->hs.new_cipher->algorithm_mkey; | 417 | alg_k = S3I(s)->hs.cipher->algorithm_mkey; |
| 418 | 418 | ||
| 419 | /* | 419 | /* |
| 420 | * Only send if using a DH key exchange. | 420 | * Only send if using a DH key exchange. |
| @@ -459,7 +459,7 @@ ssl3_accept(SSL *s) | |||
| 459 | if (!(s->verify_mode & SSL_VERIFY_PEER) || | 459 | if (!(s->verify_mode & SSL_VERIFY_PEER) || |
| 460 | ((s->session->peer != NULL) && | 460 | ((s->session->peer != NULL) && |
| 461 | (s->verify_mode & SSL_VERIFY_CLIENT_ONCE)) || | 461 | (s->verify_mode & SSL_VERIFY_CLIENT_ONCE)) || |
| 462 | ((S3I(s)->hs.new_cipher->algorithm_auth & | 462 | ((S3I(s)->hs.cipher->algorithm_auth & |
| 463 | SSL_aNULL) && !(s->verify_mode & | 463 | SSL_aNULL) && !(s->verify_mode & |
| 464 | SSL_VERIFY_FAIL_IF_NO_PEER_CERT))) { | 464 | SSL_VERIFY_FAIL_IF_NO_PEER_CERT))) { |
| 465 | /* No cert request. */ | 465 | /* No cert request. */ |
| @@ -542,7 +542,7 @@ ssl3_accept(SSL *s) | |||
| 542 | s->internal->init_num = 0; | 542 | s->internal->init_num = 0; |
| 543 | } | 543 | } |
| 544 | 544 | ||
| 545 | alg_k = S3I(s)->hs.new_cipher->algorithm_mkey; | 545 | alg_k = S3I(s)->hs.cipher->algorithm_mkey; |
| 546 | if (ret == 2) { | 546 | if (ret == 2) { |
| 547 | /* | 547 | /* |
| 548 | * For the ECDH ciphersuites when | 548 | * For the ECDH ciphersuites when |
| @@ -641,7 +641,7 @@ ssl3_accept(SSL *s) | |||
| 641 | 641 | ||
| 642 | case SSL3_ST_SW_CHANGE_A: | 642 | case SSL3_ST_SW_CHANGE_A: |
| 643 | case SSL3_ST_SW_CHANGE_B: | 643 | case SSL3_ST_SW_CHANGE_B: |
| 644 | s->session->cipher = S3I(s)->hs.new_cipher; | 644 | s->session->cipher = S3I(s)->hs.cipher; |
| 645 | if (!tls1_setup_key_block(s)) { | 645 | if (!tls1_setup_key_block(s)) { |
| 646 | ret = -1; | 646 | ret = -1; |
| 647 | goto end; | 647 | goto end; |
| @@ -1122,15 +1122,15 @@ ssl3_get_client_hello(SSL *s) | |||
| 1122 | SSLerror(s, SSL_R_NO_SHARED_CIPHER); | 1122 | SSLerror(s, SSL_R_NO_SHARED_CIPHER); |
| 1123 | goto fatal_err; | 1123 | goto fatal_err; |
| 1124 | } | 1124 | } |
| 1125 | S3I(s)->hs.new_cipher = c; | 1125 | S3I(s)->hs.cipher = c; |
| 1126 | } else { | 1126 | } else { |
| 1127 | S3I(s)->hs.new_cipher = s->session->cipher; | 1127 | S3I(s)->hs.cipher = s->session->cipher; |
| 1128 | } | 1128 | } |
| 1129 | 1129 | ||
| 1130 | if (!tls1_transcript_hash_init(s)) | 1130 | if (!tls1_transcript_hash_init(s)) |
| 1131 | goto err; | 1131 | goto err; |
| 1132 | 1132 | ||
| 1133 | alg_k = S3I(s)->hs.new_cipher->algorithm_mkey; | 1133 | alg_k = S3I(s)->hs.cipher->algorithm_mkey; |
| 1134 | if (!(SSL_USE_SIGALGS(s) || (alg_k & SSL_kGOST)) || | 1134 | if (!(SSL_USE_SIGALGS(s) || (alg_k & SSL_kGOST)) || |
| 1135 | !(s->verify_mode & SSL_VERIFY_PEER)) | 1135 | !(s->verify_mode & SSL_VERIFY_PEER)) |
| 1136 | tls1_transcript_free(s); | 1136 | tls1_transcript_free(s); |
| @@ -1144,7 +1144,7 @@ ssl3_get_client_hello(SSL *s) | |||
| 1144 | * ssl version is set - sslv3 | 1144 | * ssl version is set - sslv3 |
| 1145 | * s->session - The ssl session has been setup. | 1145 | * s->session - The ssl session has been setup. |
| 1146 | * s->internal->hit - session reuse flag | 1146 | * s->internal->hit - session reuse flag |
| 1147 | * s->hs.new_cipher - the new cipher to use. | 1147 | * s->hs.cipher - the new cipher to use. |
| 1148 | */ | 1148 | */ |
| 1149 | 1149 | ||
| 1150 | /* Handles TLS extensions that we couldn't check earlier */ | 1150 | /* Handles TLS extensions that we couldn't check earlier */ |
| @@ -1265,7 +1265,7 @@ ssl3_send_server_hello(SSL *s) | |||
| 1265 | 1265 | ||
| 1266 | /* Cipher suite. */ | 1266 | /* Cipher suite. */ |
| 1267 | if (!CBB_add_u16(&server_hello, | 1267 | if (!CBB_add_u16(&server_hello, |
| 1268 | ssl3_cipher_get_value(S3I(s)->hs.new_cipher))) | 1268 | ssl3_cipher_get_value(S3I(s)->hs.cipher))) |
| 1269 | goto err; | 1269 | goto err; |
| 1270 | 1270 | ||
| 1271 | /* Compression method (null). */ | 1271 | /* Compression method (null). */ |
| @@ -1336,7 +1336,7 @@ ssl3_send_server_kex_dhe(SSL *s, CBB *cbb) | |||
| 1336 | 1336 | ||
| 1337 | if (dhp == NULL && s->cert->dh_tmp_cb != NULL) | 1337 | if (dhp == NULL && s->cert->dh_tmp_cb != NULL) |
| 1338 | dhp = s->cert->dh_tmp_cb(s, 0, | 1338 | dhp = s->cert->dh_tmp_cb(s, 0, |
| 1339 | SSL_C_PKEYLENGTH(S3I(s)->hs.new_cipher)); | 1339 | SSL_C_PKEYLENGTH(S3I(s)->hs.cipher)); |
| 1340 | 1340 | ||
| 1341 | if (dhp == NULL) { | 1341 | if (dhp == NULL) { |
| 1342 | al = SSL_AD_HANDSHAKE_FAILURE; | 1342 | al = SSL_AD_HANDSHAKE_FAILURE; |
| @@ -1544,7 +1544,7 @@ ssl3_send_server_key_exchange(SSL *s) | |||
| 1544 | if (!CBB_init(&cbb_params, 0)) | 1544 | if (!CBB_init(&cbb_params, 0)) |
| 1545 | goto err; | 1545 | goto err; |
| 1546 | 1546 | ||
| 1547 | type = S3I(s)->hs.new_cipher->algorithm_mkey; | 1547 | type = S3I(s)->hs.cipher->algorithm_mkey; |
| 1548 | if (type & SSL_kDHE) { | 1548 | if (type & SSL_kDHE) { |
| 1549 | if (ssl3_send_server_kex_dhe(s, &cbb_params) != 1) | 1549 | if (ssl3_send_server_kex_dhe(s, &cbb_params) != 1) |
| 1550 | goto err; | 1550 | goto err; |
| @@ -1564,8 +1564,8 @@ ssl3_send_server_key_exchange(SSL *s) | |||
| 1564 | goto err; | 1564 | goto err; |
| 1565 | 1565 | ||
| 1566 | /* Add signature unless anonymous. */ | 1566 | /* Add signature unless anonymous. */ |
| 1567 | if (!(S3I(s)->hs.new_cipher->algorithm_auth & SSL_aNULL)) { | 1567 | if (!(S3I(s)->hs.cipher->algorithm_auth & SSL_aNULL)) { |
| 1568 | if ((pkey = ssl_get_sign_pkey(s, S3I(s)->hs.new_cipher, | 1568 | if ((pkey = ssl_get_sign_pkey(s, S3I(s)->hs.cipher, |
| 1569 | &md, &sigalg)) == NULL) { | 1569 | &md, &sigalg)) == NULL) { |
| 1570 | al = SSL_AD_DECODE_ERROR; | 1570 | al = SSL_AD_DECODE_ERROR; |
| 1571 | goto fatal_err; | 1571 | goto fatal_err; |
| @@ -2002,7 +2002,7 @@ ssl3_get_client_kex_gost(SSL *s, CBS *cbs) | |||
| 2002 | int ret = 0; | 2002 | int ret = 0; |
| 2003 | 2003 | ||
| 2004 | /* Get our certificate private key*/ | 2004 | /* Get our certificate private key*/ |
| 2005 | alg_a = S3I(s)->hs.new_cipher->algorithm_auth; | 2005 | alg_a = S3I(s)->hs.cipher->algorithm_auth; |
| 2006 | if (alg_a & SSL_aGOST01) | 2006 | if (alg_a & SSL_aGOST01) |
| 2007 | pk = s->cert->pkeys[SSL_PKEY_GOST01].privatekey; | 2007 | pk = s->cert->pkeys[SSL_PKEY_GOST01].privatekey; |
| 2008 | 2008 | ||
| @@ -2081,7 +2081,7 @@ ssl3_get_client_key_exchange(SSL *s) | |||
| 2081 | 2081 | ||
| 2082 | CBS_init(&cbs, s->internal->init_msg, n); | 2082 | CBS_init(&cbs, s->internal->init_msg, n); |
| 2083 | 2083 | ||
| 2084 | alg_k = S3I(s)->hs.new_cipher->algorithm_mkey; | 2084 | alg_k = S3I(s)->hs.cipher->algorithm_mkey; |
| 2085 | 2085 | ||
| 2086 | if (alg_k & SSL_kRSA) { | 2086 | if (alg_k & SSL_kRSA) { |
| 2087 | if (ssl3_get_client_kex_rsa(s, &cbs) != 1) | 2087 | if (ssl3_get_client_kex_rsa(s, &cbs) != 1) |
