summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_srvr.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/ssl_srvr.c')
-rw-r--r--src/lib/libssl/ssl_srvr.c26
1 files changed, 13 insertions, 13 deletions
diff --git a/src/lib/libssl/ssl_srvr.c b/src/lib/libssl/ssl_srvr.c
index dd622c2831..786362ea02 100644
--- a/src/lib/libssl/ssl_srvr.c
+++ b/src/lib/libssl/ssl_srvr.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_srvr.c,v 1.138 2022/01/11 18:28:41 jsing Exp $ */ 1/* $OpenBSD: ssl_srvr.c,v 1.139 2022/01/11 18:39:28 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -453,7 +453,7 @@ ssl3_accept(SSL *s)
453 * s3_clnt.c accepts this for SSL 3). 453 * s3_clnt.c accepts this for SSL 3).
454 */ 454 */
455 if (!(s->verify_mode & SSL_VERIFY_PEER) || 455 if (!(s->verify_mode & SSL_VERIFY_PEER) ||
456 ((s->session->peer != NULL) && 456 ((s->session->peer_cert != NULL) &&
457 (s->verify_mode & SSL_VERIFY_CLIENT_ONCE)) || 457 (s->verify_mode & SSL_VERIFY_CLIENT_ONCE)) ||
458 ((S3I(s)->hs.cipher->algorithm_auth & 458 ((S3I(s)->hs.cipher->algorithm_auth &
459 SSL_aNULL) && !(s->verify_mode & 459 SSL_aNULL) && !(s->verify_mode &
@@ -550,7 +550,7 @@ ssl3_accept(SSL *s)
550 } else if (SSL_USE_SIGALGS(s) || (alg_k & SSL_kGOST)) { 550 } else if (SSL_USE_SIGALGS(s) || (alg_k & SSL_kGOST)) {
551 S3I(s)->hs.state = SSL3_ST_SR_CERT_VRFY_A; 551 S3I(s)->hs.state = SSL3_ST_SR_CERT_VRFY_A;
552 s->internal->init_num = 0; 552 s->internal->init_num = 0;
553 if (!s->session->peer) 553 if (!s->session->peer_cert)
554 break; 554 break;
555 /* 555 /*
556 * Freeze the transcript for use during client 556 * Freeze the transcript for use during client
@@ -1807,7 +1807,7 @@ ssl3_get_client_kex_gost(SSL *s, CBS *cbs)
1807 * it is completely valid to use a client certificate for 1807 * it is completely valid to use a client certificate for
1808 * authorization only. 1808 * authorization only.
1809 */ 1809 */
1810 if ((client_pubkey = X509_get0_pubkey(s->session->peer)) != NULL) { 1810 if ((client_pubkey = X509_get0_pubkey(s->session->peer_cert)) != NULL) {
1811 if (EVP_PKEY_derive_set_peer(pkey_ctx, client_pubkey) <= 0) 1811 if (EVP_PKEY_derive_set_peer(pkey_ctx, client_pubkey) <= 0)
1812 ERR_clear_error(); 1812 ERR_clear_error();
1813 } 1813 }
@@ -1906,7 +1906,7 @@ ssl3_get_cert_verify(SSL *s)
1906 const struct ssl_sigalg *sigalg = NULL; 1906 const struct ssl_sigalg *sigalg = NULL;
1907 uint16_t sigalg_value = SIGALG_NONE; 1907 uint16_t sigalg_value = SIGALG_NONE;
1908 EVP_PKEY *pkey = NULL; 1908 EVP_PKEY *pkey = NULL;
1909 X509 *peer = NULL; 1909 X509 *peer_cert = NULL;
1910 EVP_MD_CTX *mctx = NULL; 1910 EVP_MD_CTX *mctx = NULL;
1911 int al, verify; 1911 int al, verify;
1912 const unsigned char *hdata; 1912 const unsigned char *hdata;
@@ -1928,15 +1928,15 @@ ssl3_get_cert_verify(SSL *s)
1928 1928
1929 CBS_init(&cbs, s->internal->init_msg, s->internal->init_num); 1929 CBS_init(&cbs, s->internal->init_msg, s->internal->init_num);
1930 1930
1931 if (s->session->peer != NULL) { 1931 if (s->session->peer_cert != NULL) {
1932 peer = s->session->peer; 1932 peer_cert = s->session->peer_cert;
1933 pkey = X509_get_pubkey(peer); 1933 pkey = X509_get_pubkey(peer_cert);
1934 type = X509_certificate_type(peer, pkey); 1934 type = X509_certificate_type(peer_cert, pkey);
1935 } 1935 }
1936 1936
1937 if (S3I(s)->hs.tls12.message_type != SSL3_MT_CERTIFICATE_VERIFY) { 1937 if (S3I(s)->hs.tls12.message_type != SSL3_MT_CERTIFICATE_VERIFY) {
1938 S3I(s)->hs.tls12.reuse_message = 1; 1938 S3I(s)->hs.tls12.reuse_message = 1;
1939 if (peer != NULL) { 1939 if (peer_cert != NULL) {
1940 al = SSL_AD_UNEXPECTED_MESSAGE; 1940 al = SSL_AD_UNEXPECTED_MESSAGE;
1941 SSLerror(s, SSL_R_MISSING_VERIFY_MESSAGE); 1941 SSLerror(s, SSL_R_MISSING_VERIFY_MESSAGE);
1942 goto fatal_err; 1942 goto fatal_err;
@@ -1945,7 +1945,7 @@ ssl3_get_cert_verify(SSL *s)
1945 goto end; 1945 goto end;
1946 } 1946 }
1947 1947
1948 if (peer == NULL) { 1948 if (peer_cert == NULL) {
1949 SSLerror(s, SSL_R_NO_CLIENT_CERT_RECEIVED); 1949 SSLerror(s, SSL_R_NO_CLIENT_CERT_RECEIVED);
1950 al = SSL_AD_UNEXPECTED_MESSAGE; 1950 al = SSL_AD_UNEXPECTED_MESSAGE;
1951 goto fatal_err; 1951 goto fatal_err;
@@ -2240,8 +2240,8 @@ ssl3_get_client_certificate(SSL *s)
2240 } 2240 }
2241 } 2241 }
2242 2242
2243 X509_free(s->session->peer); 2243 X509_free(s->session->peer_cert);
2244 s->session->peer = sk_X509_shift(sk); 2244 s->session->peer_cert = sk_X509_shift(sk);
2245 2245
2246 /* 2246 /*
2247 * Inconsistency alert: cert_chain does *not* include the 2247 * Inconsistency alert: cert_chain does *not* include the