Import OpenSSL 1.1.1l
This commit is contained in:
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved.
|
||||
* Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved.
|
||||
*
|
||||
* Licensed under the OpenSSL license (the "License"). You may not use
|
||||
* this file except in compliance with the License. You can obtain a copy
|
||||
@@ -172,9 +172,9 @@ int ssl3_read_n(SSL *s, size_t n, size_t max, int extend, int clearold,
|
||||
/*
|
||||
* If extend == 0, obtain new n-byte packet; if extend == 1, increase
|
||||
* packet by another n bytes. The packet will be in the sub-array of
|
||||
* s->s3->rbuf.buf specified by s->packet and s->packet_length. (If
|
||||
* s->rlayer.read_ahead is set, 'max' bytes may be stored in rbuf [plus
|
||||
* s->packet_length bytes if extend == 1].)
|
||||
* s->rlayer.rbuf.buf specified by s->rlayer.packet and
|
||||
* s->rlayer.packet_length. (If s->rlayer.read_ahead is set, 'max' bytes may
|
||||
* be stored in rbuf [plus s->rlayer.packet_length bytes if extend == 1].)
|
||||
* if clearold == 1, move the packet to the start of the buffer; if
|
||||
* clearold == 0 then leave any old packets where they were
|
||||
*/
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved.
|
||||
* Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved.
|
||||
*
|
||||
* Licensed under the OpenSSL license (the "License"). You may not use
|
||||
* this file except in compliance with the License. You can obtain a copy
|
||||
@@ -74,7 +74,6 @@ int ssl3_setup_read_buffer(SSL *s)
|
||||
b->len = len;
|
||||
}
|
||||
|
||||
RECORD_LAYER_set_packet(&s->rlayer, &(b->buf[0]));
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved.
|
||||
* Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved.
|
||||
*
|
||||
* Licensed under the OpenSSL license (the "License"). You may not use
|
||||
* this file except in compliance with the License. You can obtain a copy
|
||||
@@ -405,7 +405,7 @@ int ssl3_get_record(SSL *s)
|
||||
more = thisrr->length;
|
||||
}
|
||||
if (more > 0) {
|
||||
/* now s->packet_length == SSL3_RT_HEADER_LENGTH */
|
||||
/* now s->rlayer.packet_length == SSL3_RT_HEADER_LENGTH */
|
||||
|
||||
rret = ssl3_read_n(s, more, more, 1, 0, &n);
|
||||
if (rret <= 0)
|
||||
@@ -416,9 +416,9 @@ int ssl3_get_record(SSL *s)
|
||||
RECORD_LAYER_set_rstate(&s->rlayer, SSL_ST_READ_HEADER);
|
||||
|
||||
/*
|
||||
* At this point, s->packet_length == SSL3_RT_HEADER_LENGTH
|
||||
* + thisrr->length, or s->packet_length == SSL2_RT_HEADER_LENGTH
|
||||
* + thisrr->length and we have that many bytes in s->packet
|
||||
* At this point, s->rlayer.packet_length == SSL3_RT_HEADER_LENGTH
|
||||
* + thisrr->length, or s->rlayer.packet_length == SSL2_RT_HEADER_LENGTH
|
||||
* + thisrr->length and we have that many bytes in s->rlayer.packet
|
||||
*/
|
||||
if (thisrr->rec_version == SSL2_VERSION) {
|
||||
thisrr->input =
|
||||
@@ -429,11 +429,11 @@ int ssl3_get_record(SSL *s)
|
||||
}
|
||||
|
||||
/*
|
||||
* ok, we can now read from 's->packet' data into 'thisrr' thisrr->input
|
||||
* points at thisrr->length bytes, which need to be copied into
|
||||
* thisrr->data by either the decryption or by the decompression When
|
||||
* the data is 'copied' into the thisrr->data buffer, thisrr->input will
|
||||
* be pointed at the new buffer
|
||||
* ok, we can now read from 's->rlayer.packet' data into 'thisrr'.
|
||||
* thisrr->input points at thisrr->length bytes, which need to be copied
|
||||
* into thisrr->data by either the decryption or by the decompression.
|
||||
* When the data is 'copied' into the thisrr->data buffer,
|
||||
* thisrr->input will be updated to point at the new buffer
|
||||
*/
|
||||
|
||||
/*
|
||||
@@ -1616,16 +1616,16 @@ int dtls1_process_record(SSL *s, DTLS1_BITMAP *bitmap)
|
||||
sess = s->session;
|
||||
|
||||
/*
|
||||
* At this point, s->packet_length == SSL3_RT_HEADER_LNGTH + rr->length,
|
||||
* and we have that many bytes in s->packet
|
||||
* At this point, s->rlayer.packet_length == SSL3_RT_HEADER_LNGTH + rr->length,
|
||||
* and we have that many bytes in s->rlayer.packet
|
||||
*/
|
||||
rr->input = &(RECORD_LAYER_get_packet(&s->rlayer)[DTLS1_RT_HEADER_LENGTH]);
|
||||
|
||||
/*
|
||||
* ok, we can now read from 's->packet' data into 'rr' rr->input points
|
||||
* at rr->length bytes, which need to be copied into rr->data by either
|
||||
* the decryption or by the decompression When the data is 'copied' into
|
||||
* the rr->data buffer, rr->input will be pointed at the new buffer
|
||||
* ok, we can now read from 's->rlayer.packet' data into 'rr'. rr->input
|
||||
* points at rr->length bytes, which need to be copied into rr->data by
|
||||
* either the decryption or by the decompression. When the data is 'copied'
|
||||
* into the rr->data buffer, rr->input will be pointed at the new buffer
|
||||
*/
|
||||
|
||||
/*
|
||||
@@ -1947,7 +1947,7 @@ int dtls1_get_record(SSL *s)
|
||||
|
||||
if (rr->length >
|
||||
RECORD_LAYER_get_packet_length(&s->rlayer) - DTLS1_RT_HEADER_LENGTH) {
|
||||
/* now s->packet_length == DTLS1_RT_HEADER_LENGTH */
|
||||
/* now s->rlayer.packet_length == DTLS1_RT_HEADER_LENGTH */
|
||||
more = rr->length;
|
||||
rret = ssl3_read_n(s, more, more, 1, 1, &n);
|
||||
/* this packet contained a partial record, dump it */
|
||||
@@ -1963,7 +1963,7 @@ int dtls1_get_record(SSL *s)
|
||||
}
|
||||
|
||||
/*
|
||||
* now n == rr->length, and s->packet_length ==
|
||||
* now n == rr->length, and s->rlayer.packet_length ==
|
||||
* DTLS1_RT_HEADER_LENGTH + rr->length
|
||||
*/
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user