summaryrefslogtreecommitdiff
path: root/src/lib/libtls/tls_server.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libtls/tls_server.c')
-rw-r--r--src/lib/libtls/tls_server.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/src/lib/libtls/tls_server.c b/src/lib/libtls/tls_server.c
index 605ab69219..bb29c7ce42 100644
--- a/src/lib/libtls/tls_server.c
+++ b/src/lib/libtls/tls_server.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls_server.c,v 1.9 2015/08/22 14:52:39 jsing Exp $ */ 1/* $OpenBSD: tls_server.c,v 1.10 2015/08/27 15:26:50 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2014 Joel Sing <jsing@openbsd.org>
4 * 4 *
@@ -54,7 +54,7 @@ tls_configure_server(struct tls *ctx)
54 unsigned char sid[SSL_MAX_SSL_SESSION_ID_LENGTH]; 54 unsigned char sid[SSL_MAX_SSL_SESSION_ID_LENGTH];
55 55
56 if ((ctx->ssl_ctx = SSL_CTX_new(SSLv23_server_method())) == NULL) { 56 if ((ctx->ssl_ctx = SSL_CTX_new(SSLv23_server_method())) == NULL) {
57 tls_set_error(ctx, "ssl context failure"); 57 tls_set_errorx(ctx, "ssl context failure");
58 goto err; 58 goto err;
59 } 59 }
60 60
@@ -73,7 +73,7 @@ tls_configure_server(struct tls *ctx)
73 } else if (ctx->config->ecdhecurve != NID_undef) { 73 } else if (ctx->config->ecdhecurve != NID_undef) {
74 if ((ecdh_key = EC_KEY_new_by_curve_name( 74 if ((ecdh_key = EC_KEY_new_by_curve_name(
75 ctx->config->ecdhecurve)) == NULL) { 75 ctx->config->ecdhecurve)) == NULL) {
76 tls_set_error(ctx, "failed to set ECDHE curve"); 76 tls_set_errorx(ctx, "failed to set ECDHE curve");
77 goto err; 77 goto err;
78 } 78 }
79 SSL_CTX_set_options(ctx->ssl_ctx, SSL_OP_SINGLE_ECDH_USE); 79 SSL_CTX_set_options(ctx->ssl_ctx, SSL_OP_SINGLE_ECDH_USE);
@@ -88,7 +88,7 @@ tls_configure_server(struct tls *ctx)
88 */ 88 */
89 arc4random_buf(sid, sizeof(sid)); 89 arc4random_buf(sid, sizeof(sid));
90 if (!SSL_CTX_set_session_id_context(ctx->ssl_ctx, sid, sizeof(sid))) { 90 if (!SSL_CTX_set_session_id_context(ctx->ssl_ctx, sid, sizeof(sid))) {
91 tls_set_error(ctx, "failed to set session id context"); 91 tls_set_errorx(ctx, "failed to set session id context");
92 goto err; 92 goto err;
93 } 93 }
94 94
@@ -105,28 +105,28 @@ tls_accept_fds(struct tls *ctx, struct tls **cctx, int fd_read, int fd_write)
105 int ret, err; 105 int ret, err;
106 106
107 if ((ctx->flags & TLS_SERVER) == 0) { 107 if ((ctx->flags & TLS_SERVER) == 0) {
108 tls_set_error(ctx, "not a server context"); 108 tls_set_errorx(ctx, "not a server context");
109 goto err; 109 goto err;
110 } 110 }
111 111
112 if (conn_ctx == NULL) { 112 if (conn_ctx == NULL) {
113 if ((conn_ctx = tls_server_conn(ctx)) == NULL) { 113 if ((conn_ctx = tls_server_conn(ctx)) == NULL) {
114 tls_set_error(ctx, "connection context failure"); 114 tls_set_errorx(ctx, "connection context failure");
115 goto err; 115 goto err;
116 } 116 }
117 *cctx = conn_ctx; 117 *cctx = conn_ctx;
118 118
119 if ((conn_ctx->ssl_conn = SSL_new(ctx->ssl_ctx)) == NULL) { 119 if ((conn_ctx->ssl_conn = SSL_new(ctx->ssl_ctx)) == NULL) {
120 tls_set_error(ctx, "ssl failure"); 120 tls_set_errorx(ctx, "ssl failure");
121 goto err; 121 goto err;
122 } 122 }
123 if (SSL_set_app_data(conn_ctx->ssl_conn, conn_ctx) != 1) { 123 if (SSL_set_app_data(conn_ctx->ssl_conn, conn_ctx) != 1) {
124 tls_set_error(ctx, "ssl application data failure"); 124 tls_set_errorx(ctx, "ssl application data failure");
125 goto err; 125 goto err;
126 } 126 }
127 if (SSL_set_rfd(conn_ctx->ssl_conn, fd_read) != 1 || 127 if (SSL_set_rfd(conn_ctx->ssl_conn, fd_read) != 1 ||
128 SSL_set_wfd(conn_ctx->ssl_conn, fd_write) != 1) { 128 SSL_set_wfd(conn_ctx->ssl_conn, fd_write) != 1) {
129 tls_set_error(ctx, "ssl file descriptor failure"); 129 tls_set_errorx(ctx, "ssl file descriptor failure");
130 goto err; 130 goto err;
131 } 131 }
132 } 132 }