summaryrefslogtreecommitdiffstats
path: root/lib/libssl/t1_lib.c
diff options
context:
space:
mode:
authorjsing <jsing@openbsd.org>2017-01-23 14:35:42 +0000
committerjsing <jsing@openbsd.org>2017-01-23 14:35:42 +0000
commit1e495d311dcece48dc7c3a6d6536af975291ed3e (patch)
tree21b56fc21cb51557c351fc9ad87078b1a48ecf86 /lib/libssl/t1_lib.c
parentEnable bcmdog on RAMDISK as well so it can reboot. (diff)
downloadwireguard-openbsd-1e495d311dcece48dc7c3a6d6536af975291ed3e.tar.xz
wireguard-openbsd-1e495d311dcece48dc7c3a6d6536af975291ed3e.zip
Move options and mode from SSL_CTX and SSL to internal, since these can be
set and cleared via existing functions.
Diffstat (limited to 'lib/libssl/t1_lib.c')
-rw-r--r--lib/libssl/t1_lib.c9
1 files changed, 5 insertions, 4 deletions
diff --git a/lib/libssl/t1_lib.c b/lib/libssl/t1_lib.c
index 8e7b1b51677..00af9778ad4 100644
--- a/lib/libssl/t1_lib.c
+++ b/lib/libssl/t1_lib.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: t1_lib.c,v 1.105 2017/01/23 13:36:13 jsing Exp $ */
+/* $OpenBSD: t1_lib.c,v 1.106 2017/01/23 14:35:42 jsing Exp $ */
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
* All rights reserved.
*
@@ -435,7 +435,7 @@ tls1_get_shared_curve(SSL *s)
return (NID_undef);
/* Return first preference shared curve. */
- server_pref = (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE);
+ server_pref = (s->internal->options & SSL_OP_CIPHER_SERVER_PREFERENCE);
tls1_get_curvelist(s, (server_pref == 0), &pref, &preflen);
tls1_get_curvelist(s, (server_pref != 0), &supp, &supplen);
@@ -916,7 +916,7 @@ skip_ext:
* NB: because this code works out the length of all existing
* extensions it MUST always appear last.
*/
- if (s->options & SSL_OP_TLSEXT_PADDING) {
+ if (s->internal->options & SSL_OP_TLSEXT_PADDING) {
int hlen = ret - (unsigned char *)s->internal->init_buf->data;
/*
@@ -1832,7 +1832,8 @@ ri_check:
* which doesn't support RI so for the immediate future tolerate RI
* absence on initial connect only.
*/
- if (!renegotiate_seen && !(s->options & SSL_OP_LEGACY_SERVER_CONNECT)) {
+ if (!renegotiate_seen &&
+ !(s->internal->options & SSL_OP_LEGACY_SERVER_CONNECT)) {
*al = SSL_AD_HANDSHAKE_FAILURE;
SSLerr(SSL_F_SSL_PARSE_SERVERHELLO_TLSEXT,
SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED);