summaryrefslogtreecommitdiff
path: root/lib/libssl/s3_lib.c
diff options
context:
space:
mode:
authorJoel Sing <jsing@cvs.openbsd.org>2017-08-09 17:21:35 +0000
committerJoel Sing <jsing@cvs.openbsd.org>2017-08-09 17:21:35 +0000
commit98b57d36336008a41f7f094e2a6a9dba20449b2b (patch)
treef4bd704671b98933517cd7317ea299ae830e7c76 /lib/libssl/s3_lib.c
parent50f8fbc1f5a702a76cb0ed7c1f84654496198835 (diff)
Start splitting out SSL_CTX controls into individual functions, so that
they can eventually be exposed as direct functions/symbols.
Diffstat (limited to 'lib/libssl/s3_lib.c')
-rw-r--r--lib/libssl/s3_lib.c163
1 files changed, 92 insertions, 71 deletions
diff --git a/lib/libssl/s3_lib.c b/lib/libssl/s3_lib.c
index e3fcf598224..62761c32fe9 100644
--- a/lib/libssl/s3_lib.c
+++ b/lib/libssl/s3_lib.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: s3_lib.c,v 1.151 2017/08/09 16:50:00 jsing Exp $ */
+/* $OpenBSD: s3_lib.c,v 1.152 2017/08/09 17:21:34 jsing Exp $ */
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
* All rights reserved.
*
@@ -2107,73 +2107,101 @@ ssl3_callback_ctrl(SSL *s, int cmd, void (*fp)(void))
return (ret);
}
-long
-ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg)
+static int
+_SSL_CTX_set_tmp_dh(SSL_CTX *ctx, DH *dh)
{
- CERT *cert;
+ DH *dh_tmp;
- cert = ctx->internal->cert;
+ if ((dh_tmp = DHparams_dup(dh)) == NULL) {
+ SSLerrorx(ERR_R_DH_LIB);
+ return 0;
+ }
- switch (cmd) {
- case SSL_CTRL_NEED_TMP_RSA:
- return (0);
- case SSL_CTRL_SET_TMP_RSA:
- case SSL_CTRL_SET_TMP_RSA_CB:
- SSLerrorx(ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
- return (0);
- case SSL_CTRL_SET_TMP_DH:
- {
- DH *new = NULL, *dh;
+ DH_free(ctx->internal->cert->dh_tmp);
+ ctx->internal->cert->dh_tmp = dh_tmp;
- dh = (DH *)parg;
- if ((new = DHparams_dup(dh)) == NULL) {
- SSLerrorx(ERR_R_DH_LIB);
- return 0;
- }
- DH_free(cert->dh_tmp);
- cert->dh_tmp = new;
- return 1;
+ return 1;
+}
+
+static int
+_SSL_CTX_set_dh_auto(SSL_CTX *ctx, int state)
+{
+ ctx->internal->cert->dh_tmp_auto = state;
+ return 1;
+}
+
+static int
+_SSL_CTX_set_tmp_ecdh(SSL_CTX *ctx, EC_KEY *ecdh)
+{
+ EC_KEY *ecdh_tmp;
+
+ if (ecdh == NULL) {
+ SSLerrorx(ERR_R_ECDH_LIB);
+ return 0;
+ }
+
+ if ((ecdh_tmp = EC_KEY_dup(ecdh)) == NULL) {
+ SSLerrorx(ERR_R_EC_LIB);
+ return 0;
+ }
+ if (!(ctx->internal->options & SSL_OP_SINGLE_ECDH_USE)) {
+ if (!EC_KEY_generate_key(ecdh_tmp)) {
+ EC_KEY_free(ecdh_tmp);
+ SSLerrorx(ERR_R_ECDH_LIB);
+ return 0;
}
- /*break; */
+ }
+
+ EC_KEY_free(ctx->internal->cert->ecdh_tmp);
+ ctx->internal->cert->ecdh_tmp = ecdh_tmp;
+
+ return 1;
+}
+
+static int
+_SSL_CTX_set_ecdh_auto(SSL_CTX *ctx, int state)
+{
+ ctx->internal->cert->ecdh_tmp_auto = state;
+ return 1;
+}
+
+int
+SSL_CTX_set1_groups(SSL_CTX *ctx, const int *groups, size_t groups_len)
+{
+ return tls1_set_groups(&ctx->internal->tlsext_supportedgroups,
+ &ctx->internal->tlsext_supportedgroups_length, groups, groups_len);
+}
+
+int
+SSL_CTX_set1_groups_list(SSL_CTX *ctx, const char *groups)
+{
+ return tls1_set_groups_list(&ctx->internal->tlsext_supportedgroups,
+ &ctx->internal->tlsext_supportedgroups_length, groups);
+}
+
+long
+ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg)
+{
+ switch (cmd) {
+ case SSL_CTRL_SET_TMP_DH:
+ return _SSL_CTX_set_tmp_dh(ctx, parg);
case SSL_CTRL_SET_TMP_DH_CB:
SSLerrorx(ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
- return (0);
+ return 0;
case SSL_CTRL_SET_DH_AUTO:
- ctx->internal->cert->dh_tmp_auto = larg;
- return (1);
+ return _SSL_CTX_set_dh_auto(ctx, larg);
case SSL_CTRL_SET_TMP_ECDH:
- {
- EC_KEY *ecdh = NULL;
-
- if (parg == NULL) {
- SSLerrorx(ERR_R_ECDH_LIB);
- return 0;
- }
- ecdh = EC_KEY_dup((EC_KEY *)parg);
- if (ecdh == NULL) {
- SSLerrorx(ERR_R_EC_LIB);
- return 0;
- }
- if (!(ctx->internal->options & SSL_OP_SINGLE_ECDH_USE)) {
- if (!EC_KEY_generate_key(ecdh)) {
- EC_KEY_free(ecdh);
- SSLerrorx(ERR_R_ECDH_LIB);
- return 0;
- }
- }
-
- EC_KEY_free(cert->ecdh_tmp);
- cert->ecdh_tmp = ecdh;
- return 1;
- }
- /* break; */
+ return _SSL_CTX_set_tmp_ecdh(ctx, parg);
case SSL_CTRL_SET_TMP_ECDH_CB:
SSLerrorx(ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
- return (0);
+ return 0;
+
+ case SSL_CTRL_SET_ECDH_AUTO:
+ return _SSL_CTX_set_ecdh_auto(ctx, larg);
case SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG:
ctx->internal->tlsext_servername_arg = parg;
@@ -2208,10 +2236,6 @@ ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg)
ctx->internal->tlsext_status_arg = parg;
return 1;
- case SSL_CTRL_SET_ECDH_AUTO:
- ctx->internal->cert->ecdh_tmp_auto = larg;
- return 1;
-
/* A Thawte special :-) */
case SSL_CTRL_EXTRA_CHAIN_CERT:
if (ctx->extra_certs == NULL) {
@@ -2246,26 +2270,23 @@ ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg)
return (0);
return SSL_CTX_set_max_proto_version(ctx, larg);
+ /*
+ * Legacy controls that should eventually be removed.
+ */
+ case SSL_CTRL_NEED_TMP_RSA:
+ return 0;
+
+ case SSL_CTRL_SET_TMP_RSA:
+ case SSL_CTRL_SET_TMP_RSA_CB:
+ SSLerrorx(ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
+ return 0;
+
default:
return (0);
}
return (1);
}
-int
-SSL_CTX_set1_groups(SSL_CTX *ctx, const int *groups, size_t groups_len)
-{
- return tls1_set_groups(&ctx->internal->tlsext_supportedgroups,
- &ctx->internal->tlsext_supportedgroups_length, groups, groups_len);
-}
-
-int
-SSL_CTX_set1_groups_list(SSL_CTX *ctx, const char *groups)
-{
- return tls1_set_groups_list(&ctx->internal->tlsext_supportedgroups,
- &ctx->internal->tlsext_supportedgroups_length, groups);
-}
-
long
ssl3_ctx_callback_ctrl(SSL_CTX *ctx, int cmd, void (*fp)(void))
{