diff options
Diffstat (limited to 'src/lib/libssl/tls13_legacy.c')
-rw-r--r-- | src/lib/libssl/tls13_legacy.c | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/src/lib/libssl/tls13_legacy.c b/src/lib/libssl/tls13_legacy.c index f611aa061d..19271ef787 100644 --- a/src/lib/libssl/tls13_legacy.c +++ b/src/lib/libssl/tls13_legacy.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: tls13_legacy.c,v 1.22 2021/02/25 17:06:05 jsing Exp $ */ | 1 | /* $OpenBSD: tls13_legacy.c,v 1.23 2021/03/21 18:36:34 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -361,7 +361,7 @@ tls13_use_legacy_client(struct tls13_ctx *ctx) | |||
361 | s->internal->handshake_func = s->method->internal->ssl_connect; | 361 | s->internal->handshake_func = s->method->internal->ssl_connect; |
362 | s->client_version = s->version = s->method->internal->max_tls_version; | 362 | s->client_version = s->version = s->method->internal->max_tls_version; |
363 | 363 | ||
364 | S3I(s)->hs.state = SSL3_ST_CR_SRVR_HELLO_A; | 364 | ctx->hs->state = SSL3_ST_CR_SRVR_HELLO_A; |
365 | 365 | ||
366 | return 1; | 366 | return 1; |
367 | } | 367 | } |
@@ -378,7 +378,7 @@ tls13_use_legacy_server(struct tls13_ctx *ctx) | |||
378 | s->client_version = s->version = s->method->internal->max_tls_version; | 378 | s->client_version = s->version = s->method->internal->max_tls_version; |
379 | s->server = 1; | 379 | s->server = 1; |
380 | 380 | ||
381 | S3I(s)->hs.state = SSL3_ST_SR_CLNT_HELLO_A; | 381 | ctx->hs->state = SSL3_ST_SR_CLNT_HELLO_A; |
382 | 382 | ||
383 | return 1; | 383 | return 1; |
384 | } | 384 | } |
@@ -396,7 +396,7 @@ tls13_legacy_accept(SSL *ssl) | |||
396 | } | 396 | } |
397 | ssl->internal->tls13 = ctx; | 397 | ssl->internal->tls13 = ctx; |
398 | ctx->ssl = ssl; | 398 | ctx->ssl = ssl; |
399 | ctx->hs = &S3I(ssl)->hs_tls13; | 399 | ctx->hs = &S3I(ssl)->hs; |
400 | 400 | ||
401 | if (!tls13_server_init(ctx)) { | 401 | if (!tls13_server_init(ctx)) { |
402 | if (ERR_peek_error() == 0) | 402 | if (ERR_peek_error() == 0) |
@@ -406,13 +406,13 @@ tls13_legacy_accept(SSL *ssl) | |||
406 | } | 406 | } |
407 | 407 | ||
408 | ERR_clear_error(); | 408 | ERR_clear_error(); |
409 | S3I(ssl)->hs.state = SSL_ST_ACCEPT; | 409 | ctx->hs->state = SSL_ST_ACCEPT; |
410 | 410 | ||
411 | ret = tls13_server_accept(ctx); | 411 | ret = tls13_server_accept(ctx); |
412 | if (ret == TLS13_IO_USE_LEGACY) | 412 | if (ret == TLS13_IO_USE_LEGACY) |
413 | return ssl->method->internal->ssl_accept(ssl); | 413 | return ssl->method->internal->ssl_accept(ssl); |
414 | if (ret == TLS13_IO_SUCCESS) | 414 | if (ret == TLS13_IO_SUCCESS) |
415 | S3I(ssl)->hs.state = SSL_ST_OK; | 415 | ctx->hs->state = SSL_ST_OK; |
416 | 416 | ||
417 | return tls13_legacy_return_code(ssl, ret); | 417 | return tls13_legacy_return_code(ssl, ret); |
418 | } | 418 | } |
@@ -438,7 +438,7 @@ tls13_legacy_connect(SSL *ssl) | |||
438 | } | 438 | } |
439 | ssl->internal->tls13 = ctx; | 439 | ssl->internal->tls13 = ctx; |
440 | ctx->ssl = ssl; | 440 | ctx->ssl = ssl; |
441 | ctx->hs = &S3I(ssl)->hs_tls13; | 441 | ctx->hs = &S3I(ssl)->hs; |
442 | 442 | ||
443 | if (!tls13_client_init(ctx)) { | 443 | if (!tls13_client_init(ctx)) { |
444 | if (ERR_peek_error() == 0) | 444 | if (ERR_peek_error() == 0) |
@@ -448,13 +448,13 @@ tls13_legacy_connect(SSL *ssl) | |||
448 | } | 448 | } |
449 | 449 | ||
450 | ERR_clear_error(); | 450 | ERR_clear_error(); |
451 | S3I(ssl)->hs.state = SSL_ST_CONNECT; | 451 | ctx->hs->state = SSL_ST_CONNECT; |
452 | 452 | ||
453 | ret = tls13_client_connect(ctx); | 453 | ret = tls13_client_connect(ctx); |
454 | if (ret == TLS13_IO_USE_LEGACY) | 454 | if (ret == TLS13_IO_USE_LEGACY) |
455 | return ssl->method->internal->ssl_connect(ssl); | 455 | return ssl->method->internal->ssl_connect(ssl); |
456 | if (ret == TLS13_IO_SUCCESS) | 456 | if (ret == TLS13_IO_SUCCESS) |
457 | S3I(ssl)->hs.state = SSL_ST_OK; | 457 | ctx->hs->state = SSL_ST_OK; |
458 | 458 | ||
459 | return tls13_legacy_return_code(ssl, ret); | 459 | return tls13_legacy_return_code(ssl, ret); |
460 | } | 460 | } |