More cleanup.

(cherry picked from commit 5eda213ebe382009c2f37a8eade5cbcdae6017ed)
Conflicts:
	apps/s_client.c
	apps/s_server.c
This commit is contained in:
Ben Laurie 2013-08-01 12:33:15 +01:00 committed by Scott Deboy
parent 8b41df41c2
commit 8acf1ff4b4
8 changed files with 29 additions and 45 deletions

View File

@ -876,12 +876,12 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
case 16: case 16:
str_details1 = ", ClientKeyExchange"; str_details1 = ", ClientKeyExchange";
break; break;
case 23:
str_details1 = ", SupplementalData";
break;
case 20: case 20:
str_details1 = ", Finished"; str_details1 = ", Finished";
break; break;
case 23:
str_details1 = ", SupplementalData";
break;
} }
} }
} }

View File

@ -2440,18 +2440,12 @@ static int authz_tlsext_cb(SSL *s, unsigned short ext_type,
void *arg) void *arg)
{ {
if (TLSEXT_TYPE_server_authz == ext_type) if (TLSEXT_TYPE_server_authz == ext_type)
{ server_provided_server_authz
server_provided_server_authz = (memchr(in, = (memchr(in, TLSEXT_AUTHZDATAFORMAT_dtcp, inlen) != NULL);
TLSEXT_AUTHZDATAFORMAT_dtcp,
inlen) != NULL);
}
if (TLSEXT_TYPE_client_authz == ext_type) if (TLSEXT_TYPE_client_authz == ext_type)
{ server_provided_client_authz
server_provided_client_authz = (memchr(in, = (memchr(in, TLSEXT_AUTHZDATAFORMAT_dtcp, inlen) != NULL);
TLSEXT_AUTHZDATAFORMAT_dtcp,
inlen) != NULL);
}
return 1; return 1;
} }

View File

@ -1053,7 +1053,7 @@ int MAIN(int argc, char *argv[])
EVP_PKEY *s_key = NULL, *s_dkey = NULL; EVP_PKEY *s_key = NULL, *s_dkey = NULL;
int no_cache = 0, ext_cache = 0; int no_cache = 0, ext_cache = 0;
int rev = 0, naccept = -1; int rev = 0, naccept = -1;
int c_no_resumption_on_reneg = 0; int c_no_resumption_on_reneg = 0;
#ifndef OPENSSL_NO_TLSEXT #ifndef OPENSSL_NO_TLSEXT
EVP_PKEY *s_key2 = NULL; EVP_PKEY *s_key2 = NULL;
X509 *s_cert2 = NULL; X509 *s_cert2 = NULL;
@ -1961,10 +1961,8 @@ bad:
} }
#endif #endif
if (c_no_resumption_on_reneg) if (c_no_resumption_on_reneg)
{ SSL_CTX_set_options(ctx, SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION);
SSL_CTX_set_options(ctx, SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION);
}
if (!set_cert_key_stuff(ctx, s_cert, s_key, s_chain, build_chain)) if (!set_cert_key_stuff(ctx, s_cert, s_key, s_chain, build_chain))
goto end; goto end;
#ifndef OPENSSL_NO_TLSEXT #ifndef OPENSSL_NO_TLSEXT
@ -3558,18 +3556,12 @@ static int authz_tlsext_cb(SSL *s, unsigned short ext_type,
void *arg) void *arg)
{ {
if (TLSEXT_TYPE_server_authz == ext_type) if (TLSEXT_TYPE_server_authz == ext_type)
{ client_provided_server_authz
client_provided_server_authz = (memchr(in, = memchr(in, TLSEXT_AUTHZDATAFORMAT_dtcp, inlen) != NULL;
TLSEXT_AUTHZDATAFORMAT_dtcp,
inlen) != NULL);
}
if (TLSEXT_TYPE_client_authz == ext_type) if (TLSEXT_TYPE_client_authz == ext_type)
{ client_provided_client_authz
client_provided_client_authz = (memchr(in, = memchr(in, TLSEXT_AUTHZDATAFORMAT_dtcp, inlen) != NULL;
TLSEXT_AUTHZDATAFORMAT_dtcp,
inlen) != NULL);
}
return 1; return 1;
} }

View File

@ -3571,9 +3571,11 @@ int ssl3_check_finished(SSL *s)
{ {
int ok; int ok;
long n; long n;
/* Read the message to see if it is supplemental data, regardless if there is a session ticket
this function is called when we really expect a Certificate /* Read the message to see if it is supplemental data,
message, so permit appropriate message length */ * regardless if there is a session ticket this function is
* called when we really expect a Certificate message, so
* permit appropriate message length */
n=s->method->ssl_get_message(s, n=s->method->ssl_get_message(s,
SSL3_ST_CR_CERT_A, SSL3_ST_CR_CERT_A,
SSL3_ST_CR_CERT_B, SSL3_ST_CR_CERT_B,
@ -3584,9 +3586,7 @@ int ssl3_check_finished(SSL *s)
s->s3->tmp.reuse_message = 1; s->s3->tmp.reuse_message = 1;
if (s->s3->tmp.message_type == SSL3_MT_SUPPLEMENTAL_DATA) if (s->s3->tmp.message_type == SSL3_MT_SUPPLEMENTAL_DATA)
{
return 3; return 3;
}
/* If we have no ticket it cannot be a resumed session. */ /* If we have no ticket it cannot be a resumed session. */
if (!s->session->tlsext_tick) if (!s->session->tlsext_tick)
return 1; return 1;
@ -3739,7 +3739,7 @@ int tls1_get_server_supplemental_data(SSL *s)
goto f_err; goto f_err;
} }
n2l3(p, supp_data_len); n2l3(p, supp_data_len);
while (p<d+supp_data_len) while (p < d+supp_data_len)
{ {
n2s(p, supp_data_entry_type); n2s(p, supp_data_entry_type);
n2s(p, supp_data_entry_len); n2s(p, supp_data_entry_len);
@ -3759,7 +3759,7 @@ int tls1_get_server_supplemental_data(SSL *s)
} }
} }
} }
p+=supp_data_entry_len; p += supp_data_entry_len;
} }
return 1; return 1;
f_err: f_err:

View File

@ -903,9 +903,7 @@ int ssl3_check_client_hello(SSL *s)
s->s3->tmp.reuse_message = 1; s->s3->tmp.reuse_message = 1;
#ifndef OPENSSL_NO_TLSEXT #ifndef OPENSSL_NO_TLSEXT
if (s->s3->tmp.message_type == SSL3_MT_SUPPLEMENTAL_DATA) if (s->s3->tmp.message_type == SSL3_MT_SUPPLEMENTAL_DATA)
{
return 3; return 3;
}
#endif #endif
if (s->s3->tmp.message_type == SSL3_MT_CLIENT_HELLO) if (s->s3->tmp.message_type == SSL3_MT_CLIENT_HELLO)
{ {

View File

@ -1202,11 +1202,11 @@ struct ssl_ctx_st
custom_srv_ext_record *custom_srv_ext_records; custom_srv_ext_record *custom_srv_ext_records;
size_t custom_srv_ext_records_count; size_t custom_srv_ext_records_count;
/* Arrays containing the callbacks for Supplemental Data. */ /* Arrays containing the callbacks for Supplemental Data. */
cli_supp_data_record *cli_supp_data_records; cli_supp_data_record *cli_supp_data_records;
size_t cli_supp_data_records_count; size_t cli_supp_data_records_count;
srv_supp_data_record *srv_supp_data_records; srv_supp_data_record *srv_supp_data_records;
size_t srv_supp_data_records_count; size_t srv_supp_data_records_count;
}; };
#endif #endif

View File

@ -1877,7 +1877,7 @@ int SSL_CTX_set_cli_supp_data(SSL_CTX *ctx,
return 0; return 0;
ctx->cli_supp_data_records = OPENSSL_realloc(ctx->cli_supp_data_records, ctx->cli_supp_data_records = OPENSSL_realloc(ctx->cli_supp_data_records,
(ctx->cli_supp_data_records_count+1) * sizeof(cli_supp_data_record)); (ctx->cli_supp_data_records_count+1) * sizeof(cli_supp_data_record));
if (!ctx->cli_supp_data_records) if (!ctx->cli_supp_data_records)
{ {
ctx->cli_supp_data_records_count = 0; ctx->cli_supp_data_records_count = 0;
@ -1906,7 +1906,7 @@ int SSL_CTX_set_srv_supp_data(SSL_CTX *ctx,
return 0; return 0;
ctx->srv_supp_data_records = OPENSSL_realloc(ctx->srv_supp_data_records, ctx->srv_supp_data_records = OPENSSL_realloc(ctx->srv_supp_data_records,
(ctx->srv_supp_data_records_count+1) * sizeof(srv_supp_data_record)); (ctx->srv_supp_data_records_count+1) * sizeof(srv_supp_data_record));
if (!ctx->srv_supp_data_records) if (!ctx->srv_supp_data_records)
{ {
ctx->srv_supp_data_records_count = 0; ctx->srv_supp_data_records_count = 0;

View File

@ -446,7 +446,7 @@ int custom_ext = 0;
/* This set based on extension callbacks */ /* This set based on extension callbacks */
int custom_ext_error = 0; int custom_ext_error = 0;
/*Not IETF assigned supplemental data types*/ /* Not IETF assigned supplemental data types */
#define CUSTOM_SUPP_DATA_TYPE_0 100 #define CUSTOM_SUPP_DATA_TYPE_0 100
#define CUSTOM_SUPP_DATA_TYPE_1 101 #define CUSTOM_SUPP_DATA_TYPE_1 101
#define CUSTOM_SUPP_DATA_TYPE_2 102 #define CUSTOM_SUPP_DATA_TYPE_2 102