*/
#include <stdio.h>
+#include <openssl/md5.h>
+#include <openssl/sha.h>
#include <openssl/objects.h>
#include "ssl_locl.h"
#define SSL3_NUM_CIPHERS (sizeof(ssl3_ciphers)/sizeof(SSL_CIPHER))
-#ifndef NOPROTO
static long ssl3_default_timeout(void );
-#else
-static long ssl3_default_timeout();
-#endif
-SSL_CIPHER ssl3_ciphers[]={
+OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]={
/* The RSA ciphers */
/* Cipher 01 */
{
#endif
0)
{
- if (!ssl_cert_instantiate(&s->cert, s->ctx->default_cert))
+ if (!ssl_cert_inst(&s->cert))
{
SSLerr(SSL_F_SSL3_CTRL, ERR_R_MALLOC_FAILURE);
return(0);
}
break;
case SSL_CTRL_SET_TMP_RSA_CB:
-#ifndef NOPROTO
s->cert->rsa_tmp_cb = (RSA *(*)(SSL *, int, int))parg;
-#else
- s->cert->rsa_tmp_cb = (RSA *(*)())parg;
-#endif
break;
#endif
#ifndef NO_DH
}
break;
case SSL_CTRL_SET_TMP_DH_CB:
-#ifndef NOPROTO
s->cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))parg;
-#else
- s->cert->dh_tmp_cb = (DH *(*)())parg;
-#endif
break;
#endif
default:
{
CERT *cert;
- cert=ctx->default_cert;
+ cert=ctx->cert;
switch (cmd)
{
}
/* break; */
case SSL_CTRL_SET_TMP_RSA_CB:
-#ifndef NOPROTO
cert->rsa_tmp_cb=(RSA *(*)(SSL *, int, int))parg;
-#else
- cert->rsa_tmp_cb=(RSA *(*)())parg;
-#endif
break;
#endif
#ifndef NO_DH
}
/*break; */
case SSL_CTRL_SET_TMP_DH_CB:
-#ifndef NOPROTO
cert->dh_tmp_cb=(DH *(*)(SSL *, int, int))parg;
-#else
- cert->dh_tmp_cb=(DH *(*)())parg;
-#endif
break;
#endif
/* A Thawte special :-) */
CERT *cert;
unsigned long alg,mask,emask;
- /* Lets see which ciphers we can supported */
- if (s->cert != NULL)
- cert=s->cert;
- else
- cert=s->ctx->default_cert;
+ /* Let's see which ciphers we can support */
+ cert=s->cert;
sk_SSL_CIPHER_set_cmp_func(pref,ssl_cipher_ptr_id_cmp);
{
c=sk_SSL_CIPHER_value(have,i);
- ssl_set_cert_masks(cert,s->ctx->default_cert,c);
+ ssl_set_cert_masks(cert,c);
mask=cert->mask;
emask=cert->export_mask;