diff options
author | Daiki Ueno <ueno@gnu.org> | 2020-09-21 11:25:59 +0000 |
---|---|---|
committer | Daiki Ueno <ueno@gnu.org> | 2020-09-21 11:25:59 +0000 |
commit | e70f2d03175ed594a442d2c94e0f70e332853c3e (patch) | |
tree | 1ff1508737a4b47f0df8a73300f7a9b13985ac23 /lib/ext/pre_shared_key.c | |
parent | 7202e921db9da6faddcab8d2ac872508ee2281be (diff) | |
parent | 23958322865a8a77c2f924f569484e5fd150a24b (diff) | |
download | gnutls-e70f2d03175ed594a442d2c94e0f70e332853c3e.tar.gz |
Merge branch 'tmp-clock_nanosleep' into 'master'
tests: allow clock_nanosleep in seccomp tests
Closes #1086
See merge request gnutls/gnutls!1325
Diffstat (limited to 'lib/ext/pre_shared_key.c')
-rw-r--r-- | lib/ext/pre_shared_key.c | 38 |
1 files changed, 18 insertions, 20 deletions
diff --git a/lib/ext/pre_shared_key.c b/lib/ext/pre_shared_key.c index 240be21625..b5a86b7db1 100644 --- a/lib/ext/pre_shared_key.c +++ b/lib/ext/pre_shared_key.c @@ -277,6 +277,7 @@ client_send_params(gnutls_session_t session, psk_auth_info_t info = NULL; unsigned psk_id_len = 0; unsigned binders_len, binders_pos; + tls13_ticket_st *ticket = &session->internals.tls13_ticket; if (((session->internals.flags & GNUTLS_NO_TICKETS) || session->internals.tls13_ticket.ticket.data == NULL) && @@ -295,47 +296,44 @@ client_send_params(gnutls_session_t session, /* First, let's see if we have a session ticket to send */ if (!(session->internals.flags & GNUTLS_NO_TICKETS) && - session->internals.tls13_ticket.ticket.data != NULL) { + ticket->ticket.data != NULL) { + /* We found a session ticket */ - if (unlikely(session->internals.tls13_ticket.prf == NULL)) { - _gnutls13_session_ticket_unset(session); + if (unlikely(ticket->prf == NULL)) { + tls13_ticket_deinit(ticket); ret = gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR); goto cleanup; } - prf_res = session->internals.tls13_ticket.prf; + prf_res = ticket->prf; gnutls_gettime(&cur_time); if (unlikely(_gnutls_timespec_cmp(&cur_time, - &session->internals. - tls13_ticket. - arrival_time) < 0)) { + &ticket->arrival_time) < 0)) { gnutls_assert(); - _gnutls13_session_ticket_unset(session); + tls13_ticket_deinit(ticket); goto ignore_ticket; } /* Check whether the ticket is stale */ - ticket_age = timespec_sub_ms(&cur_time, - &session->internals.tls13_ticket. - arrival_time); - if (ticket_age / 1000 > session->internals.tls13_ticket.lifetime) { - _gnutls13_session_ticket_unset(session); + ticket_age = timespec_sub_ms(&cur_time, &ticket->arrival_time); + if (ticket_age / 1000 > ticket->lifetime) { + tls13_ticket_deinit(ticket); goto ignore_ticket; } - ret = compute_psk_from_ticket(&session->internals.tls13_ticket, &rkey); + ret = compute_psk_from_ticket(ticket, &rkey); if (ret < 0) { - _gnutls13_session_ticket_unset(session); + tls13_ticket_deinit(ticket); goto ignore_ticket; } /* Calculate obfuscated ticket age, in milliseconds, mod 2^32 */ - ob_ticket_age = ticket_age + session->internals.tls13_ticket.age_add; + ob_ticket_age = ticket_age + ticket->age_add; if ((ret = _gnutls_buffer_append_data_prefix(extdata, 16, - session->internals.tls13_ticket.ticket.data, - session->internals.tls13_ticket.ticket.size)) < 0) { + ticket->ticket.data, + ticket->ticket.size)) < 0) { gnutls_assert(); goto cleanup; } @@ -346,7 +344,7 @@ client_send_params(gnutls_session_t session, goto cleanup; } - psk_id_len += 6 + session->internals.tls13_ticket.ticket.size; + psk_id_len += 6 + ticket->ticket.size; binders_len += 1 + _gnutls_mac_get_algo_len(prf_res); } @@ -577,7 +575,7 @@ static int server_recv_params(gnutls_session_t session, /* This will unpack the session ticket if it is well * formed and has the expected name */ if (!(session->internals.flags & GNUTLS_NO_TICKETS) && - (ret = _gnutls13_unpack_session_ticket(session, &psk.identity, &ticket_data)) == 0) { + _gnutls13_unpack_session_ticket(session, &psk.identity, &ticket_data) == 0) { prf = ticket_data.prf; session->internals.resumption_requested = 1; |