diff options
author | 2017-01-23 06:45:30 +0000 | |
---|---|---|
committer | 2017-01-23 06:45:30 +0000 | |
commit | b084913af34130559f11bce93b5619f290347501 (patch) | |
tree | 52e36803afaacde2673f6c0c667d204f38604d42 /lib/libssl/s3_lib.c | |
parent | No need to explicitly use config_activate_children in the cfattach struct. (diff) | |
download | wireguard-openbsd-b084913af34130559f11bce93b5619f290347501.tar.xz wireguard-openbsd-b084913af34130559f11bce93b5619f290347501.zip |
Move a large part of ssl_st into internal, so we can see what squeals.
ok jsing@
Diffstat (limited to 'lib/libssl/s3_lib.c')
-rw-r--r-- | lib/libssl/s3_lib.c | 62 |
1 files changed, 31 insertions, 31 deletions
diff --git a/lib/libssl/s3_lib.c b/lib/libssl/s3_lib.c index 3e44d5e4c17..67745577562 100644 --- a/lib/libssl/s3_lib.c +++ b/lib/libssl/s3_lib.c @@ -1,4 +1,4 @@ -/* $OpenBSD: s3_lib.c,v 1.124 2017/01/23 05:13:02 jsing Exp $ */ +/* $OpenBSD: s3_lib.c,v 1.125 2017/01/23 06:45:30 beck Exp $ */ /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * @@ -1697,7 +1697,7 @@ ssl3_handshake_msg_start(SSL *s, uint8_t msg_type) { unsigned char *d, *p; - d = p = (unsigned char *)s->init_buf->data; + d = p = (unsigned char *)s->internal->init_buf->data; /* Handshake message type and length. */ *(p++) = msg_type; @@ -1712,14 +1712,14 @@ ssl3_handshake_msg_finish(SSL *s, unsigned int len) unsigned char *d, *p; uint8_t msg_type; - d = p = (unsigned char *)s->init_buf->data; + d = p = (unsigned char *)s->internal->init_buf->data; /* Handshake message length. */ msg_type = *(p++); l2n3(len, p); - s->init_num = ssl3_handshake_msg_hdr_len(s) + (int)len; - s->init_off = 0; + s->internal->init_num = ssl3_handshake_msg_hdr_len(s) + (int)len; + s->internal->init_off = 0; if (SSL_IS_DTLS(s)) { dtls1_set_message_header(s, d, msg_type, len, 0, len); @@ -1766,13 +1766,13 @@ ssl3_handshake_msg_finish_cbb(SSL *s, CBB *handshake) if (outlen > INT_MAX) goto err; - if (!BUF_MEM_grow_clean(s->init_buf, outlen)) + if (!BUF_MEM_grow_clean(s->internal->init_buf, outlen)) goto err; - memcpy(s->init_buf->data, data, outlen); + memcpy(s->internal->init_buf->data, data, outlen); - s->init_num = (int)outlen; - s->init_off = 0; + s->internal->init_num = (int)outlen; + s->internal->init_off = 0; if (SSL_IS_DTLS(s)) { unsigned long len; @@ -1905,7 +1905,7 @@ ssl3_clear(SSL *s) S3I(s)->num_renegotiations = 0; S3I(s)->in_read_app_data = 0; - s->packet_length = 0; + s->internal->packet_length = 0; s->version = TLS1_VERSION; free(s->internal->next_proto_negotiated); @@ -1990,7 +1990,7 @@ ssl3_ctrl(SSL *s, int cmd, long larg, void *parg) switch (cmd) { case SSL_CTRL_GET_SESSION_REUSED: - ret = s->hit; + ret = s->internal->hit; break; case SSL_CTRL_GET_CLIENT_CERT_REQUEST: break; @@ -2112,33 +2112,33 @@ ssl3_ctrl(SSL *s, int cmd, long larg, void *parg) break; case SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS: - *(STACK_OF(X509_EXTENSION) **)parg = s->tlsext_ocsp_exts; + *(STACK_OF(X509_EXTENSION) **)parg = s->internal->tlsext_ocsp_exts; ret = 1; break; case SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS: - s->tlsext_ocsp_exts = parg; + s->internal->tlsext_ocsp_exts = parg; ret = 1; break; case SSL_CTRL_GET_TLSEXT_STATUS_REQ_IDS: - *(STACK_OF(OCSP_RESPID) **)parg = s->tlsext_ocsp_ids; + *(STACK_OF(OCSP_RESPID) **)parg = s->internal->tlsext_ocsp_ids; ret = 1; break; case SSL_CTRL_SET_TLSEXT_STATUS_REQ_IDS: - s->tlsext_ocsp_ids = parg; + s->internal->tlsext_ocsp_ids = parg; ret = 1; break; case SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP: - *(unsigned char **)parg = s->tlsext_ocsp_resp; - return s->tlsext_ocsp_resplen; + *(unsigned char **)parg = s->internal->tlsext_ocsp_resp; + return s->internal->tlsext_ocsp_resplen; case SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP: - free(s->tlsext_ocsp_resp); - s->tlsext_ocsp_resp = parg; - s->tlsext_ocsp_resplen = larg; + free(s->internal->tlsext_ocsp_resp); + s->internal->tlsext_ocsp_resp = parg; + s->internal->tlsext_ocsp_resplen = larg; ret = 1; break; @@ -2505,13 +2505,13 @@ ssl3_shutdown(SSL *s) * Don't do anything much if we have not done the handshake or * we don't want to send messages :-) */ - if ((s->quiet_shutdown) || (s->state == SSL_ST_BEFORE)) { - s->shutdown = (SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN); + if ((s->internal->quiet_shutdown) || (s->state == SSL_ST_BEFORE)) { + s->internal->shutdown = (SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN); return (1); } - if (!(s->shutdown & SSL_SENT_SHUTDOWN)) { - s->shutdown|=SSL_SENT_SHUTDOWN; + if (!(s->internal->shutdown & SSL_SENT_SHUTDOWN)) { + s->internal->shutdown|=SSL_SENT_SHUTDOWN; ssl3_send_alert(s, SSL3_AL_WARNING, SSL_AD_CLOSE_NOTIFY); /* * Our shutdown alert has been sent now, and if it still needs @@ -2531,15 +2531,15 @@ ssl3_shutdown(SSL *s) */ return (ret); } - } else if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) { + } else if (!(s->internal->shutdown & SSL_RECEIVED_SHUTDOWN)) { /* If we are waiting for a close from our peer, we are closed */ s->method->ssl_read_bytes(s, 0, NULL, 0, 0); - if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) { + if (!(s->internal->shutdown & SSL_RECEIVED_SHUTDOWN)) { return(-1); /* return WANT_READ */ } } - if ((s->shutdown == (SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN)) && + if ((s->internal->shutdown == (SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN)) && !s->s3->alert_dispatch) return (1); else @@ -2552,8 +2552,8 @@ ssl3_write(SSL *s, const void *buf, int len) int ret, n; #if 0 - if (s->shutdown & SSL_SEND_SHUTDOWN) { - s->rwstate = SSL_NOTHING; + if (s->internal->shutdown & SSL_SEND_SHUTDOWN) { + s->internal->rwstate = SSL_NOTHING; return (0); } #endif @@ -2579,11 +2579,11 @@ ssl3_write(SSL *s, const void *buf, int len) S3I(s)->delay_buf_pop_ret = ret; } - s->rwstate = SSL_WRITING; + s->internal->rwstate = SSL_WRITING; n = BIO_flush(s->wbio); if (n <= 0) return (n); - s->rwstate = SSL_NOTHING; + s->internal->rwstate = SSL_NOTHING; /* We have flushed the buffer, so remove it */ ssl_free_wbio_buffer(s); |