summaryrefslogtreecommitdiffstats
path: root/lib/libssl/ssl_both.c
diff options
context:
space:
mode:
authorbeck <beck@openbsd.org>2017-05-07 04:22:24 +0000
committerbeck <beck@openbsd.org>2017-05-07 04:22:24 +0000
commit440bed4fbf67c71055029b3e3067c272d9453bf5 (patch)
tree52b4b4cebc1418ac46724df5173a011a50033f2a /lib/libssl/ssl_both.c
parentLimit -Werror to gcc4 as was done in libcrypto/libssl/libtls to avoid (diff)
downloadwireguard-openbsd-440bed4fbf67c71055029b3e3067c272d9453bf5.tar.xz
wireguard-openbsd-440bed4fbf67c71055029b3e3067c272d9453bf5.zip
Move state from ssl->internal to the handshake structure.
while we are at it, convert SSLerror to use a function internally, so that we may later allocate the handshake structure and check for it ok jsing@
Diffstat (limited to 'lib/libssl/ssl_both.c')
-rw-r--r--lib/libssl/ssl_both.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/lib/libssl/ssl_both.c b/lib/libssl/ssl_both.c
index 13c39e85b2d..4a724560f24 100644
--- a/lib/libssl/ssl_both.c
+++ b/lib/libssl/ssl_both.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ssl_both.c,v 1.8 2017/05/06 22:24:57 beck Exp $ */
+/* $OpenBSD: ssl_both.c,v 1.9 2017/05/07 04:22:24 beck Exp $ */
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
* All rights reserved.
*
@@ -171,7 +171,7 @@ ssl3_send_finished(SSL *s, int a, int b, const char *sender, int slen)
memset(&cbb, 0, sizeof(cbb));
- if (s->internal->state == a) {
+ if (S3I(s)->hs.state == a) {
md_len = TLS1_FINISH_MAC_LENGTH;
OPENSSL_assert(md_len <= EVP_MAX_MD_SIZE);
@@ -199,7 +199,7 @@ ssl3_send_finished(SSL *s, int a, int b, const char *sender, int slen)
if (!ssl3_handshake_msg_finish_cbb(s, &cbb))
goto err;
- s->internal->state = b;
+ S3I(s)->hs.state = b;
}
return (ssl3_handshake_write(s));
@@ -227,7 +227,7 @@ ssl3_take_mac(SSL *s)
if (S3I(s)->hs.new_cipher == NULL)
return;
- if (s->internal->state & SSL_ST_CONNECT) {
+ if (S3I(s)->hs.state & SSL_ST_CONNECT) {
sender = TLS_MD_SERVER_FINISH_CONST;
slen = TLS_MD_SERVER_FINISH_CONST_SIZE;
} else {
@@ -313,13 +313,13 @@ ssl3_send_change_cipher_spec(SSL *s, int a, int b)
{
unsigned char *p;
- if (s->internal->state == a) {
+ if (S3I(s)->hs.state == a) {
p = (unsigned char *)s->internal->init_buf->data;
*p = SSL3_MT_CCS;
s->internal->init_num = 1;
s->internal->init_off = 0;
- s->internal->state = b;
+ S3I(s)->hs.state = b;
}
/* SSL3_ST_CW_CHANGE_B */
@@ -442,7 +442,7 @@ ssl3_get_message(SSL *s, int st1, int stn, int mt, long max, int *ok)
p = (unsigned char *)s->internal->init_buf->data;
/* s->internal->init_num < 4 */
- if (s->internal->state == st1) {
+ if (S3I(s)->hs.state == st1) {
int skip_message;
do {
@@ -504,7 +504,7 @@ ssl3_get_message(SSL *s, int st1, int stn, int mt, long max, int *ok)
goto err;
}
S3I(s)->tmp.message_size = l;
- s->internal->state = stn;
+ S3I(s)->hs.state = stn;
s->internal->init_msg = s->internal->init_buf->data + 4;
s->internal->init_num = 0;