@@ -3229,8 +3229,8 @@ int mbedtls_ssl_prepare_handshake_record(mbedtls_ssl_context *ssl)
3229
3229
3230
3230
if (ssl -> in_hslen == 0 ) {
3231
3231
ssl -> in_hslen = mbedtls_ssl_hs_hdr_len (ssl ) + ssl_get_hs_total_len (ssl );
3232
- ssl -> in_ext -> in_hsfraglen = 0 ;
3233
- ssl -> in_ext -> in_hshdr = ssl -> in_hdr ;
3232
+ mbedtls_ssl_get_in_ext ( ssl ) -> in_hsfraglen = 0 ;
3233
+ mbedtls_ssl_get_in_ext ( ssl ) -> in_hshdr = ssl -> in_hdr ;
3234
3234
}
3235
3235
3236
3236
MBEDTLS_SSL_DEBUG_MSG (3 , ("handshake message: msglen ="
@@ -3298,35 +3298,35 @@ int mbedtls_ssl_prepare_handshake_record(mbedtls_ssl_context *ssl)
3298
3298
} else
3299
3299
#endif /* MBEDTLS_SSL_PROTO_DTLS */
3300
3300
{
3301
- if (ssl -> in_ext -> in_hsfraglen > ssl -> in_hslen ) {
3301
+ if (mbedtls_ssl_get_in_ext ( ssl ) -> in_hsfraglen > ssl -> in_hslen ) {
3302
3302
return MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED ;
3303
3303
}
3304
3304
int ret ;
3305
- const size_t hs_remain = ssl -> in_hslen - ssl -> in_ext -> in_hsfraglen ;
3305
+ const size_t hs_remain = ssl -> in_hslen - mbedtls_ssl_get_in_ext ( ssl ) -> in_hsfraglen ;
3306
3306
MBEDTLS_SSL_DEBUG_MSG (3 ,
3307
3307
("handshake fragment: %" MBEDTLS_PRINTF_SIZET " .. %"
3308
3308
MBEDTLS_PRINTF_SIZET " of %"
3309
3309
MBEDTLS_PRINTF_SIZET " msglen %" MBEDTLS_PRINTF_SIZET ,
3310
- ssl -> in_ext -> in_hsfraglen ,
3311
- ssl -> in_ext -> in_hsfraglen +
3310
+ mbedtls_ssl_get_in_ext ( ssl ) -> in_hsfraglen ,
3311
+ mbedtls_ssl_get_in_ext ( ssl ) -> in_hsfraglen +
3312
3312
(hs_remain <= ssl -> in_msglen ? hs_remain : ssl -> in_msglen ),
3313
3313
ssl -> in_hslen , ssl -> in_msglen ));
3314
3314
if (ssl -> in_msglen < hs_remain ) {
3315
- ssl -> in_ext -> in_hsfraglen += ssl -> in_msglen ;
3315
+ mbedtls_ssl_get_in_ext ( ssl ) -> in_hsfraglen += ssl -> in_msglen ;
3316
3316
ssl -> in_hdr = ssl -> in_msg + ssl -> in_msglen ;
3317
3317
ssl -> in_msglen = 0 ;
3318
3318
mbedtls_ssl_update_in_pointers (ssl );
3319
3319
return MBEDTLS_ERR_SSL_CONTINUE_PROCESSING ;
3320
3320
}
3321
- if (ssl -> in_ext -> in_hshdr != ssl -> in_hdr ) {
3321
+ if (mbedtls_ssl_get_in_ext ( ssl ) -> in_hshdr != ssl -> in_hdr ) {
3322
3322
/*
3323
- * At ssl->in_ext ->in_hshdr we have a sequence of records that cover the next handshake
3323
+ * At mbedtls_ssl_get_in_ext( ssl) ->in_hshdr we have a sequence of records that cover the next handshake
3324
3324
* record, each with its own record header that we need to remove.
3325
3325
* Note that the reassembled record size may not equal the size of the message,
3326
3326
* there maybe bytes from the next message following it.
3327
3327
*/
3328
3328
size_t merged_rec_len = 0 ;
3329
- unsigned char * p = ssl -> in_ext -> in_hshdr , * q = NULL ;
3329
+ unsigned char * p = mbedtls_ssl_get_in_ext ( ssl ) -> in_hshdr , * q = NULL ;
3330
3330
do {
3331
3331
mbedtls_record rec ;
3332
3332
ret = ssl_parse_record_header (ssl , p , mbedtls_ssl_in_hdr_len (ssl ), & rec );
@@ -3342,13 +3342,13 @@ int mbedtls_ssl_prepare_handshake_record(mbedtls_ssl_context *ssl)
3342
3342
q = p ;
3343
3343
}
3344
3344
} while (merged_rec_len < ssl -> in_hslen );
3345
- ssl -> in_hdr = ssl -> in_ext -> in_hshdr ;
3345
+ ssl -> in_hdr = mbedtls_ssl_get_in_ext ( ssl ) -> in_hshdr ;
3346
3346
mbedtls_ssl_update_in_pointers (ssl );
3347
3347
ssl -> in_msglen = merged_rec_len ;
3348
3348
/* Adjust message length. */
3349
3349
MBEDTLS_PUT_UINT16_BE (merged_rec_len , ssl -> in_len , 0 );
3350
- ssl -> in_ext -> in_hsfraglen = 0 ;
3351
- ssl -> in_ext -> in_hshdr = NULL ;
3350
+ mbedtls_ssl_get_in_ext ( ssl ) -> in_hsfraglen = 0 ;
3351
+ mbedtls_ssl_get_in_ext ( ssl ) -> in_hshdr = NULL ;
3352
3352
MBEDTLS_SSL_DEBUG_BUF (4 , "reassembled record" ,
3353
3353
ssl -> in_hdr , mbedtls_ssl_in_hdr_len (ssl ) + merged_rec_len );
3354
3354
}
@@ -4696,13 +4696,13 @@ static int ssl_consume_current_message(mbedtls_ssl_context *ssl)
4696
4696
return MBEDTLS_ERR_SSL_INTERNAL_ERROR ;
4697
4697
}
4698
4698
4699
- if (ssl -> in_ext -> in_hsfraglen != 0 ) {
4699
+ if (mbedtls_ssl_get_in_ext ( ssl ) -> in_hsfraglen != 0 ) {
4700
4700
/* Not all handshake fragments have arrived, do not consume. */
4701
4701
MBEDTLS_SSL_DEBUG_MSG (3 ,
4702
4702
("waiting for more fragments (%" MBEDTLS_PRINTF_SIZET " of %"
4703
4703
MBEDTLS_PRINTF_SIZET ", %" MBEDTLS_PRINTF_SIZET " left)" ,
4704
- ssl -> in_ext -> in_hsfraglen , ssl -> in_hslen ,
4705
- ssl -> in_hslen - ssl -> in_ext -> in_hsfraglen ));
4704
+ mbedtls_ssl_get_in_ext ( ssl ) -> in_hsfraglen , ssl -> in_hslen ,
4705
+ ssl -> in_hslen - mbedtls_ssl_get_in_ext ( ssl ) -> in_hsfraglen ));
4706
4706
return 0 ;
4707
4707
}
4708
4708
@@ -4955,7 +4955,7 @@ static int ssl_get_next_record(mbedtls_ssl_context *ssl)
4955
4955
#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID )
4956
4956
ssl -> in_len = ssl -> in_cid + rec .cid_len ;
4957
4957
#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
4958
- ssl -> in_ext -> in_iv = ssl -> in_msg = ssl -> in_len + 2 ;
4958
+ mbedtls_ssl_get_in_ext ( ssl ) -> in_iv = ssl -> in_msg = ssl -> in_len + 2 ;
4959
4959
ssl -> in_msglen = rec .data_len ;
4960
4960
4961
4961
ret = ssl_check_client_reconnect (ssl );
@@ -5074,7 +5074,7 @@ static int ssl_get_next_record(mbedtls_ssl_context *ssl)
5074
5074
#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID )
5075
5075
ssl -> in_len = ssl -> in_cid + rec .cid_len ;
5076
5076
#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
5077
- ssl -> in_ext -> in_iv = ssl -> in_len + 2 ;
5077
+ mbedtls_ssl_get_in_ext ( ssl ) -> in_iv = ssl -> in_len + 2 ;
5078
5078
5079
5079
/* The record content type may change during decryption,
5080
5080
* so re-read it. */
@@ -5380,7 +5380,7 @@ void mbedtls_ssl_update_out_pointers(mbedtls_ssl_context *ssl,
5380
5380
void mbedtls_ssl_update_in_pointers (mbedtls_ssl_context * ssl )
5381
5381
{
5382
5382
/* This function sets the pointers to match the case
5383
- * of unprotected TLS/DTLS records, with both ssl->in_ext ->in_iv
5383
+ * of unprotected TLS/DTLS records, with both mbedtls_ssl_get_in_ext( ssl) ->in_iv
5384
5384
* and ssl->in_msg pointing to the beginning of the record
5385
5385
* content.
5386
5386
*
@@ -5402,7 +5402,7 @@ void mbedtls_ssl_update_in_pointers(mbedtls_ssl_context *ssl)
5402
5402
#else /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
5403
5403
ssl -> in_len = ssl -> in_ctr + MBEDTLS_SSL_SEQUENCE_NUMBER_LEN ;
5404
5404
#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
5405
- ssl -> in_ext -> in_iv = ssl -> in_len + 2 ;
5405
+ mbedtls_ssl_get_in_ext ( ssl ) -> in_iv = ssl -> in_len + 2 ;
5406
5406
} else
5407
5407
#endif
5408
5408
{
@@ -5411,11 +5411,11 @@ void mbedtls_ssl_update_in_pointers(mbedtls_ssl_context *ssl)
5411
5411
#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID )
5412
5412
ssl -> in_cid = ssl -> in_len ;
5413
5413
#endif
5414
- ssl -> in_ext -> in_iv = ssl -> in_hdr + 5 ;
5414
+ mbedtls_ssl_get_in_ext ( ssl ) -> in_iv = ssl -> in_hdr + 5 ;
5415
5415
}
5416
5416
5417
5417
/* This will be adjusted at record decryption time. */
5418
- ssl -> in_msg = ssl -> in_ext -> in_iv ;
5418
+ ssl -> in_msg = mbedtls_ssl_get_in_ext ( ssl ) -> in_iv ;
5419
5419
}
5420
5420
5421
5421
/*
0 commit comments