| OLD | NEW |
| 1 /* ssl/s3_enc.c */ | 1 /* ssl/s3_enc.c */ |
| 2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 * All rights reserved. | 3 * All rights reserved. |
| 4 * | 4 * |
| 5 * This package is an SSL implementation written | 5 * This package is an SSL implementation written |
| 6 * by Eric Young (eay@cryptsoft.com). | 6 * by Eric Young (eay@cryptsoft.com). |
| 7 * The implementation was written so as to conform with Netscapes SSL. | 7 * The implementation was written so as to conform with Netscapes SSL. |
| 8 * | 8 * |
| 9 * This library is free for commercial and non-commercial use as long as | 9 * This library is free for commercial and non-commercial use as long as |
| 10 * the following conditions are aheared to. The following conditions | 10 * the following conditions are aheared to. The following conditions |
| (...skipping 379 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 390 unsigned char *p; | 390 unsigned char *p; |
| 391 const EVP_CIPHER *c; | 391 const EVP_CIPHER *c; |
| 392 const EVP_MD *hash; | 392 const EVP_MD *hash; |
| 393 int num; | 393 int num; |
| 394 int ret = 0; | 394 int ret = 0; |
| 395 SSL_COMP *comp; | 395 SSL_COMP *comp; |
| 396 | 396 |
| 397 if (s->s3->tmp.key_block_length != 0) | 397 if (s->s3->tmp.key_block_length != 0) |
| 398 return(1); | 398 return(1); |
| 399 | 399 |
| 400 » if (!ssl_cipher_get_evp(s->session,&c,&hash,NULL,NULL,&comp)) | 400 » if (!ssl_cipher_get_comp(s->session, &comp)) |
| 401 { | 401 { |
| 402 SSLerr(SSL_F_SSL3_SETUP_KEY_BLOCK,SSL_R_CIPHER_OR_HASH_UNAVAILAB
LE); | 402 SSLerr(SSL_F_SSL3_SETUP_KEY_BLOCK,SSL_R_CIPHER_OR_HASH_UNAVAILAB
LE); |
| 403 return(0); | 403 return(0); |
| 404 } |
| 405 |
| 406 if (!ssl_cipher_get_evp(s->session,&c,&hash,NULL,NULL)) |
| 407 { |
| 408 SSLerr(SSL_F_SSL3_SETUP_KEY_BLOCK,SSL_R_CIPHER_OR_HASH_UNAVAILAB
LE); |
| 409 return(0); |
| 404 } | 410 } |
| 405 | 411 |
| 406 s->s3->tmp.new_sym_enc=c; | 412 s->s3->tmp.new_sym_enc=c; |
| 407 s->s3->tmp.new_hash=hash; | 413 s->s3->tmp.new_hash=hash; |
| 408 #ifdef OPENSSL_NO_COMP | 414 #ifdef OPENSSL_NO_COMP |
| 409 s->s3->tmp.new_compression=NULL; | 415 s->s3->tmp.new_compression=NULL; |
| 410 #else | 416 #else |
| 411 s->s3->tmp.new_compression=comp; | 417 s->s3->tmp.new_compression=comp; |
| 412 #endif | 418 #endif |
| 413 | 419 |
| (...skipping 475 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 889 case SSL_AD_UNSUPPORTED_EXTENSION: return(SSL3_AD_HANDSHAKE_FAILURE); | 895 case SSL_AD_UNSUPPORTED_EXTENSION: return(SSL3_AD_HANDSHAKE_FAILURE); |
| 890 case SSL_AD_CERTIFICATE_UNOBTAINABLE: return(SSL3_AD_HANDSHAKE_FAILURE); | 896 case SSL_AD_CERTIFICATE_UNOBTAINABLE: return(SSL3_AD_HANDSHAKE_FAILURE); |
| 891 case SSL_AD_UNRECOGNIZED_NAME: return(SSL3_AD_HANDSHAKE_FAILURE); | 897 case SSL_AD_UNRECOGNIZED_NAME: return(SSL3_AD_HANDSHAKE_FAILURE); |
| 892 case SSL_AD_BAD_CERTIFICATE_STATUS_RESPONSE: return(SSL3_AD_HANDSHAKE_FA
ILURE); | 898 case SSL_AD_BAD_CERTIFICATE_STATUS_RESPONSE: return(SSL3_AD_HANDSHAKE_FA
ILURE); |
| 893 case SSL_AD_BAD_CERTIFICATE_HASH_VALUE: return(SSL3_AD_HANDSHAKE_FAILURE
); | 899 case SSL_AD_BAD_CERTIFICATE_HASH_VALUE: return(SSL3_AD_HANDSHAKE_FAILURE
); |
| 894 case SSL_AD_UNKNOWN_PSK_IDENTITY:return(TLS1_AD_UNKNOWN_PSK_IDENTITY); | 900 case SSL_AD_UNKNOWN_PSK_IDENTITY:return(TLS1_AD_UNKNOWN_PSK_IDENTITY); |
| 895 default: return(-1); | 901 default: return(-1); |
| 896 } | 902 } |
| 897 } | 903 } |
| 898 | 904 |
| OLD | NEW |