mirror of
https://github.com/openssl/openssl.git
synced 2024-11-27 05:21:51 +08:00
Majority rules, use session_ctx vs initial_ctx
session_ctx and initial_ctx are aliases of each other, and with the opaque data structures, there's no need to keep both around. Since there were more references of session_ctx, replace all instances of initial_ctx with session_ctx. Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/2334)
This commit is contained in:
parent
0a2dcb6990
commit
222da97918
@ -599,7 +599,7 @@ SSL *SSL_new(SSL_CTX *ctx)
|
||||
s->ext.ocsp.resp = NULL;
|
||||
s->ext.ocsp.resp_len = 0;
|
||||
SSL_CTX_up_ref(ctx);
|
||||
s->initial_ctx = ctx;
|
||||
s->session_ctx = ctx;
|
||||
#ifndef OPENSSL_NO_EC
|
||||
if (ctx->ext.ecpointformats) {
|
||||
s->ext.ecpointformats =
|
||||
@ -995,7 +995,7 @@ void SSL_free(SSL *s)
|
||||
/* Free up if allocated */
|
||||
|
||||
OPENSSL_free(s->ext.hostname);
|
||||
SSL_CTX_free(s->initial_ctx);
|
||||
SSL_CTX_free(s->session_ctx);
|
||||
#ifndef OPENSSL_NO_EC
|
||||
OPENSSL_free(s->ext.ecpointformats);
|
||||
OPENSSL_free(s->ext.supportedgroups);
|
||||
@ -3483,7 +3483,7 @@ SSL_CTX *SSL_set_SSL_CTX(SSL *ssl, SSL_CTX *ctx)
|
||||
if (ssl->ctx == ctx)
|
||||
return ssl->ctx;
|
||||
if (ctx == NULL)
|
||||
ctx = ssl->initial_ctx;
|
||||
ctx = ssl->session_ctx;
|
||||
new_cert = ssl_cert_dup(ctx->cert);
|
||||
if (new_cert == NULL) {
|
||||
return NULL;
|
||||
|
@ -1150,10 +1150,7 @@ struct ssl_st {
|
||||
/* Have we attempted to find/parse SCTs yet? */
|
||||
int scts_parsed;
|
||||
# endif
|
||||
SSL_CTX *initial_ctx; /* initial ctx, used to store sessions */
|
||||
# ifndef OPENSSL_NO_NEXTPROTONEG
|
||||
# endif
|
||||
# define session_ctx initial_ctx
|
||||
SSL_CTX *session_ctx; /* initial ctx, used to store sessions */
|
||||
/* What we'll do */
|
||||
STACK_OF(SRTP_PROTECTION_PROFILE) *srtp_profiles;
|
||||
/* What's been chosen */
|
||||
|
@ -736,10 +736,10 @@ static int final_server_name(SSL *s, unsigned int context, int sent,
|
||||
if (s->ctx != NULL && s->ctx->ext.servername_cb != 0)
|
||||
ret = s->ctx->ext.servername_cb(s, &altmp,
|
||||
s->ctx->ext.servername_arg);
|
||||
else if (s->initial_ctx != NULL
|
||||
&& s->initial_ctx->ext.servername_cb != 0)
|
||||
ret = s->initial_ctx->ext.servername_cb(s, &altmp,
|
||||
s->initial_ctx->ext.servername_arg);
|
||||
else if (s->session_ctx != NULL
|
||||
&& s->session_ctx->ext.servername_cb != 0)
|
||||
ret = s->session_ctx->ext.servername_cb(s, &altmp,
|
||||
s->session_ctx->ext.servername_arg);
|
||||
|
||||
switch (ret) {
|
||||
case SSL_TLSEXT_ERR_ALERT_FATAL:
|
||||
|
@ -3221,7 +3221,7 @@ int tls_construct_new_session_ticket(SSL *s, WPACKET *pkt)
|
||||
int len, slen_full, slen, lenfinal;
|
||||
SSL_SESSION *sess;
|
||||
unsigned int hlen;
|
||||
SSL_CTX *tctx = s->initial_ctx;
|
||||
SSL_CTX *tctx = s->session_ctx;
|
||||
unsigned char iv[EVP_MAX_IV_LENGTH];
|
||||
unsigned char key_name[TLSEXT_KEYNAME_LENGTH];
|
||||
int iv_len, al = SSL_AD_INTERNAL_ERROR;
|
||||
|
@ -1186,7 +1186,7 @@ TICKET_RETURN tls_decrypt_ticket(SSL *s, const unsigned char *etick,
|
||||
unsigned char tick_hmac[EVP_MAX_MD_SIZE];
|
||||
HMAC_CTX *hctx = NULL;
|
||||
EVP_CIPHER_CTX *ctx;
|
||||
SSL_CTX *tctx = s->initial_ctx;
|
||||
SSL_CTX *tctx = s->session_ctx;
|
||||
|
||||
/* Initialize session ticket encryption and HMAC contexts */
|
||||
hctx = HMAC_CTX_new();
|
||||
|
Loading…
Reference in New Issue
Block a user