summaryrefslogtreecommitdiff
path: root/src/lib/libssl/tls13_legacy.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/tls13_legacy.c')
-rw-r--r--src/lib/libssl/tls13_legacy.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/src/lib/libssl/tls13_legacy.c b/src/lib/libssl/tls13_legacy.c
index f611aa061d..19271ef787 100644
--- a/src/lib/libssl/tls13_legacy.c
+++ b/src/lib/libssl/tls13_legacy.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls13_legacy.c,v 1.22 2021/02/25 17:06:05 jsing Exp $ */ 1/* $OpenBSD: tls13_legacy.c,v 1.23 2021/03/21 18:36:34 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org>
4 * 4 *
@@ -361,7 +361,7 @@ tls13_use_legacy_client(struct tls13_ctx *ctx)
361 s->internal->handshake_func = s->method->internal->ssl_connect; 361 s->internal->handshake_func = s->method->internal->ssl_connect;
362 s->client_version = s->version = s->method->internal->max_tls_version; 362 s->client_version = s->version = s->method->internal->max_tls_version;
363 363
364 S3I(s)->hs.state = SSL3_ST_CR_SRVR_HELLO_A; 364 ctx->hs->state = SSL3_ST_CR_SRVR_HELLO_A;
365 365
366 return 1; 366 return 1;
367} 367}
@@ -378,7 +378,7 @@ tls13_use_legacy_server(struct tls13_ctx *ctx)
378 s->client_version = s->version = s->method->internal->max_tls_version; 378 s->client_version = s->version = s->method->internal->max_tls_version;
379 s->server = 1; 379 s->server = 1;
380 380
381 S3I(s)->hs.state = SSL3_ST_SR_CLNT_HELLO_A; 381 ctx->hs->state = SSL3_ST_SR_CLNT_HELLO_A;
382 382
383 return 1; 383 return 1;
384} 384}
@@ -396,7 +396,7 @@ tls13_legacy_accept(SSL *ssl)
396 } 396 }
397 ssl->internal->tls13 = ctx; 397 ssl->internal->tls13 = ctx;
398 ctx->ssl = ssl; 398 ctx->ssl = ssl;
399 ctx->hs = &S3I(ssl)->hs_tls13; 399 ctx->hs = &S3I(ssl)->hs;
400 400
401 if (!tls13_server_init(ctx)) { 401 if (!tls13_server_init(ctx)) {
402 if (ERR_peek_error() == 0) 402 if (ERR_peek_error() == 0)
@@ -406,13 +406,13 @@ tls13_legacy_accept(SSL *ssl)
406 } 406 }
407 407
408 ERR_clear_error(); 408 ERR_clear_error();
409 S3I(ssl)->hs.state = SSL_ST_ACCEPT; 409 ctx->hs->state = SSL_ST_ACCEPT;
410 410
411 ret = tls13_server_accept(ctx); 411 ret = tls13_server_accept(ctx);
412 if (ret == TLS13_IO_USE_LEGACY) 412 if (ret == TLS13_IO_USE_LEGACY)
413 return ssl->method->internal->ssl_accept(ssl); 413 return ssl->method->internal->ssl_accept(ssl);
414 if (ret == TLS13_IO_SUCCESS) 414 if (ret == TLS13_IO_SUCCESS)
415 S3I(ssl)->hs.state = SSL_ST_OK; 415 ctx->hs->state = SSL_ST_OK;
416 416
417 return tls13_legacy_return_code(ssl, ret); 417 return tls13_legacy_return_code(ssl, ret);
418} 418}
@@ -438,7 +438,7 @@ tls13_legacy_connect(SSL *ssl)
438 } 438 }
439 ssl->internal->tls13 = ctx; 439 ssl->internal->tls13 = ctx;
440 ctx->ssl = ssl; 440 ctx->ssl = ssl;
441 ctx->hs = &S3I(ssl)->hs_tls13; 441 ctx->hs = &S3I(ssl)->hs;
442 442
443 if (!tls13_client_init(ctx)) { 443 if (!tls13_client_init(ctx)) {
444 if (ERR_peek_error() == 0) 444 if (ERR_peek_error() == 0)
@@ -448,13 +448,13 @@ tls13_legacy_connect(SSL *ssl)
448 } 448 }
449 449
450 ERR_clear_error(); 450 ERR_clear_error();
451 S3I(ssl)->hs.state = SSL_ST_CONNECT; 451 ctx->hs->state = SSL_ST_CONNECT;
452 452
453 ret = tls13_client_connect(ctx); 453 ret = tls13_client_connect(ctx);
454 if (ret == TLS13_IO_USE_LEGACY) 454 if (ret == TLS13_IO_USE_LEGACY)
455 return ssl->method->internal->ssl_connect(ssl); 455 return ssl->method->internal->ssl_connect(ssl);
456 if (ret == TLS13_IO_SUCCESS) 456 if (ret == TLS13_IO_SUCCESS)
457 S3I(ssl)->hs.state = SSL_ST_OK; 457 ctx->hs->state = SSL_ST_OK;
458 458
459 return tls13_legacy_return_code(ssl, ret); 459 return tls13_legacy_return_code(ssl, ret);
460} 460}