From f8eff50c9ac6772239e96a6d2031a83bac497a15 Mon Sep 17 00:00:00 2001 From: jsing <> Date: Fri, 19 Jul 2024 08:54:31 +0000 Subject: Move client ciphers from SSL_SESSION to SSL_HANDSHAKE. SSL_SESSION has a 'ciphers' member which contains a list of ciphers that were advertised by the client. Move this from SSL_SESSION to SSL_HANDSHAKE and rename it to match reality. ok tb@ --- src/lib/libssl/ssl_srvr.c | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) (limited to 'src/lib/libssl/ssl_srvr.c') diff --git a/src/lib/libssl/ssl_srvr.c b/src/lib/libssl/ssl_srvr.c index e9f14dc610..d6b7de1efd 100644 --- a/src/lib/libssl/ssl_srvr.c +++ b/src/lib/libssl/ssl_srvr.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ssl_srvr.c,v 1.161 2024/06/25 14:10:45 jsing Exp $ */ +/* $OpenBSD: ssl_srvr.c,v 1.162 2024/07/19 08:54:31 jsing Exp $ */ /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * @@ -1078,13 +1078,13 @@ ssl3_get_client_hello(SSL *s) s->hit = 1; s->session->verify_result = X509_V_OK; - sk_SSL_CIPHER_free(s->session->ciphers); - s->session->ciphers = ciphers; + sk_SSL_CIPHER_free(s->s3->hs.client_ciphers); + s->s3->hs.client_ciphers = ciphers; ciphers = NULL; /* Check if some cipher was preferred by the callback. */ if (pref_cipher == NULL) - pref_cipher = ssl3_choose_cipher(s, s->session->ciphers, + pref_cipher = ssl3_choose_cipher(s, s->s3->hs.client_ciphers, SSL_get_ciphers(s)); if (pref_cipher == NULL) { al = SSL_AD_HANDSHAKE_FAILURE; @@ -1094,7 +1094,7 @@ ssl3_get_client_hello(SSL *s) s->session->cipher = pref_cipher; sk_SSL_CIPHER_free(s->cipher_list); - s->cipher_list = sk_SSL_CIPHER_dup(s->session->ciphers); + s->cipher_list = sk_SSL_CIPHER_dup(s->s3->hs.client_ciphers); } /* @@ -1108,11 +1108,11 @@ ssl3_get_client_hello(SSL *s) SSLerror(s, SSL_R_NO_CIPHERS_PASSED); goto fatal_err; } - sk_SSL_CIPHER_free(s->session->ciphers); - s->session->ciphers = ciphers; + sk_SSL_CIPHER_free(s->s3->hs.client_ciphers); + s->s3->hs.client_ciphers = ciphers; ciphers = NULL; - if ((c = ssl3_choose_cipher(s, s->session->ciphers, + if ((c = ssl3_choose_cipher(s, s->s3->hs.client_ciphers, SSL_get_ciphers(s))) == NULL) { al = SSL_AD_HANDSHAKE_FAILURE; SSLerror(s, SSL_R_NO_SHARED_CIPHER); -- cgit v1.2.3-55-g6feb