summaryrefslogtreecommitdiffstats
path: root/ssl/statem
diff options
context:
space:
mode:
authorRich Salz <rsalz@openssl.org>2016-12-11 15:01:28 -0500
committerRich Salz <rsalz@openssl.org>2017-01-09 22:26:47 -0500
commit8cbfcc70bf37886064ef852dda9e1bf40e904756 (patch)
tree5e6a20b59466db5e1a60442d7614e4d9358a8185 /ssl/statem
parentaff8c126fd8db84fa4ef623997a8c4200a14a44f (diff)
Use typedefs for PSK, NPN, ALPN callback functions
Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2052)
Diffstat (limited to 'ssl/statem')
-rw-r--r--ssl/statem/extensions.c24
-rw-r--r--ssl/statem/statem_clnt.c8
-rw-r--r--ssl/statem/statem_srvr.c13
3 files changed, 10 insertions, 35 deletions
diff --git a/ssl/statem/extensions.c b/ssl/statem/extensions.c
index 2568ac6573..a68dd48835 100644
--- a/ssl/statem/extensions.c
+++ b/ssl/statem/extensions.c
@@ -799,31 +799,13 @@ static int init_status_request(SSL *s, unsigned int context)
* Ensure we get sensible values passed to tlsext_status_cb in the event
* that we don't receive a status message
*/
- OPENSSL_free(s->tlsext_ocsp_resp);
- s->ext.ocsp_resp = NULL;
- s->ext.ocsp_resplen = 0;
+ OPENSSL_free(s->ext.ocsp.resp);
+ s->ext.ocsp.resp = NULL;
+ s->ext.ocsp.resp_len = 0;
}
return 1;
}
-
-static int final_status_request(SSL *s, unsigned int context, int sent,
- int *al)
-{
- if (s->server)
- return 1;
-
- /*
- * Ensure we get sensible values passed to ext.status_cb in the event
- * that we don't receive a status message
- */
- OPENSSL_free(s->ext.ocsp.resp);
- s->ext.ocsp.resp = NULL;
- s->ext.ocsp.resp_len = 0;
->>>>>>> Move extension data into sub-structs
-
- return 1;
-}
#endif
#ifndef OPENSSL_NO_NEXTPROTONEG
diff --git a/ssl/statem/statem_clnt.c b/ssl/statem/statem_clnt.c
index 82713d2dfb..9fa16b1417 100644
--- a/ssl/statem/statem_clnt.c
+++ b/ssl/statem/statem_clnt.c
@@ -2204,18 +2204,18 @@ int tls_process_cert_status_body(SSL *s, PACKET *pkt, int *al)
SSLerr(SSL_F_TLS_PROCESS_CERT_STATUS_BODY, SSL_R_LENGTH_MISMATCH);
return 0;
}
- s->tlsext_ocsp_resp = OPENSSL_malloc(resplen);
- if (s->ext.ocsp_resp == NULL) {
+ s->ext.ocsp.resp = OPENSSL_malloc(resplen);
+ if (s->ext.ocsp.resp == NULL) {
*al = SSL_AD_INTERNAL_ERROR;
SSLerr(SSL_F_TLS_PROCESS_CERT_STATUS_BODY, ERR_R_MALLOC_FAILURE);
return 0;
}
- if (!PACKET_copy_bytes(pkt, s->ext.ocsp_resp, resplen)) {
+ if (!PACKET_copy_bytes(pkt, s->ext.ocsp.resp, resplen)) {
*al = SSL_AD_DECODE_ERROR;
SSLerr(SSL_F_TLS_PROCESS_CERT_STATUS_BODY, SSL_R_LENGTH_MISMATCH);
return 0;
}
- s->ext.ocsp_resplen = resplen;
+ s->ext.ocsp.resp_len = resplen;
return 1;
}
diff --git a/ssl/statem/statem_srvr.c b/ssl/statem/statem_srvr.c
index 475f405768..224b158192 100644
--- a/ssl/statem/statem_srvr.c
+++ b/ssl/statem/statem_srvr.c
@@ -3465,10 +3465,9 @@ int tls_construct_new_session_ticket(SSL *s, WPACKET *pkt)
*/
int tls_construct_cert_status_body(SSL *s, WPACKET *pkt)
{
-<<<<<<< 3b72dcd5fb4d2c756a830dba1fc34f4a7ae61b73
- if (!WPACKET_put_bytes_u8(pkt, s->tlsext_status_type)
- || !WPACKET_sub_memcpy_u24(pkt, s->tlsext_ocsp_resp,
- s->tlsext_ocsp_resplen)) {
+ if (!WPACKET_put_bytes_u8(pkt, s->ext.status_type)
+ || !WPACKET_sub_memcpy_u24(pkt, s->ext.ocsp.resp,
+ s->ext.ocsp.resp_len)) {
SSLerr(SSL_F_TLS_CONSTRUCT_CERT_STATUS_BODY, ERR_R_INTERNAL_ERROR);
return 0;
}
@@ -3479,12 +3478,6 @@ int tls_construct_cert_status_body(SSL *s, WPACKET *pkt)
int tls_construct_cert_status(SSL *s, WPACKET *pkt)
{
if (!tls_construct_cert_status_body(s, pkt)) {
-=======
- if (!WPACKET_put_bytes_u8(pkt, s->ext.status_type)
- || !WPACKET_sub_memcpy_u24(pkt, s->ext.ocsp.resp,
- s->ext.ocsp.resp_len)) {
- SSLerr(SSL_F_TLS_CONSTRUCT_CERT_STATUS, ERR_R_INTERNAL_ERROR);
->>>>>>> Move extension data into sub-structs
ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_INTERNAL_ERROR);
return 0;
}