- First replacement of xyssl by polarssl where needed
diff --git a/library/ssl_srv.c b/library/ssl_srv.c
index b8dd661..ead2b20 100644
--- a/library/ssl_srv.c
+++ b/library/ssl_srv.c
@@ -18,12 +18,12 @@
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
-#include "xyssl/config.h"
+#include "polarssl/config.h"
-#if defined(XYSSL_SSL_SRV_C)
+#if defined(POLARSSL_SSL_SRV_C)
-#include "xyssl/debug.h"
-#include "xyssl/ssl.h"
+#include "polarssl/debug.h"
+#include "polarssl/ssl.h"
#include <string.h>
#include <stdlib.h>
@@ -72,7 +72,7 @@
buf[3] != SSL_MAJOR_VERSION_3 )
{
SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
}
n = ( ( buf[0] << 8 ) | buf[1] ) & 0x7FFF;
@@ -80,7 +80,7 @@
if( n < 17 || n > 512 )
{
SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
}
ssl->max_major_ver = buf[3];
@@ -125,25 +125,25 @@
if( ciph_len < 3 || ( ciph_len % 3 ) != 0 )
{
SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
}
if( sess_len < 0 || sess_len > 32 )
{
SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
}
if( chal_len < 8 || chal_len > 32 )
{
SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
}
if( n != 6 + ciph_len + sess_len + chal_len )
{
SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
}
SSL_DEBUG_BUF( 3, "client hello, cipherlist",
@@ -196,7 +196,7 @@
buf[1] != SSL_MAJOR_VERSION_3 )
{
SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
}
n = ( buf[3] << 8 ) | buf[4];
@@ -204,7 +204,7 @@
if( n < 45 || n > 512 )
{
SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
}
if( ( ret = ssl_fetch_input( ssl, 5 + n ) ) != 0 )
@@ -249,7 +249,7 @@
buf[4] != SSL_MAJOR_VERSION_3 )
{
SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
}
ssl->major_ver = SSL_MAJOR_VERSION_3;
@@ -267,7 +267,7 @@
if( buf[1] != 0 || n != 4 + ( ( buf[2] << 8 ) | buf[3] ) )
{
SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
}
/*
@@ -278,7 +278,7 @@
if( sess_len < 0 || sess_len > 32 )
{
SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
}
ssl->session->length = sess_len;
@@ -294,7 +294,7 @@
if( ciph_len < 2 || ciph_len > 256 || ( ciph_len % 2 ) != 0 )
{
SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
}
/*
@@ -305,7 +305,7 @@
if( comp_len < 1 || comp_len > 16 )
{
SSL_DEBUG_MSG( 1, ( "bad client hello message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_HELLO );
}
SSL_DEBUG_BUF( 3, "client hello, random bytes",
@@ -333,7 +333,7 @@
SSL_DEBUG_MSG( 1, ( "got no ciphers in common" ) );
- return( XYSSL_ERR_SSL_NO_CIPHER_CHOSEN );
+ return( POLARSSL_ERR_SSL_NO_CIPHER_CHOSEN );
have_cipher:
@@ -526,9 +526,9 @@
return( 0 );
}
-#if !defined(XYSSL_DHM_C)
+#if !defined(POLARSSL_DHM_C)
SSL_DEBUG_MSG( 1, ( "support for dhm is not available" ) );
- return( XYSSL_ERR_SSL_FEATURE_UNAVAILABLE );
+ return( POLARSSL_ERR_SSL_FEATURE_UNAVAILABLE );
#else
/*
* Ephemeral DH parameters:
@@ -646,21 +646,21 @@
if( ssl->in_msgtype != SSL_MSG_HANDSHAKE )
{
SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE );
}
if( ssl->in_msg[0] != SSL_HS_CLIENT_KEY_EXCHANGE )
{
SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE );
}
if( ssl->session->cipher == SSL_EDH_RSA_DES_168_SHA ||
ssl->session->cipher == SSL_EDH_RSA_AES_256_SHA )
{
-#if !defined(XYSSL_DHM_C)
+#if !defined(POLARSSL_DHM_C)
SSL_DEBUG_MSG( 1, ( "support for dhm is not available" ) );
- return( XYSSL_ERR_SSL_FEATURE_UNAVAILABLE );
+ return( POLARSSL_ERR_SSL_FEATURE_UNAVAILABLE );
#else
/*
* Receive G^Y mod P, premaster = (G^Y)^X mod P
@@ -671,14 +671,14 @@
n + 6 != ssl->in_hslen )
{
SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE );
}
if( ( ret = dhm_read_public( &ssl->dhm_ctx,
ssl->in_msg + 6, n ) ) != 0 )
{
SSL_DEBUG_RET( 1, "dhm_read_public", ret );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE | ret );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE | ret );
}
SSL_DEBUG_MPI( 3, "DHM: GY", &ssl->dhm_ctx.GY );
@@ -689,7 +689,7 @@
ssl->premaster, &ssl->pmslen ) ) != 0 )
{
SSL_DEBUG_RET( 1, "dhm_calc_secret", ret );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE | ret );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE | ret );
}
SSL_DEBUG_MPI( 3, "DHM: K ", &ssl->dhm_ctx.K );
@@ -711,14 +711,14 @@
ssl->in_msg[5] != ( ( n ) & 0xFF ) )
{
SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE );
}
}
if( ssl->in_hslen != i + n )
{
SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE );
+ return( POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE );
}
ret = rsa_pkcs1_decrypt( ssl->rsa_key, RSA_PRIVATE, &ssl->pmslen,
@@ -782,13 +782,13 @@
if( ssl->in_msgtype != SSL_MSG_HANDSHAKE )
{
SSL_DEBUG_MSG( 1, ( "bad certificate verify message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CERTIFICATE_VERIFY );
+ return( POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE_VERIFY );
}
if( ssl->in_msg[0] != SSL_HS_CERTIFICATE_VERIFY )
{
SSL_DEBUG_MSG( 1, ( "bad certificate verify message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CERTIFICATE_VERIFY );
+ return( POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE_VERIFY );
}
n1 = ssl->peer_cert->rsa.len;
@@ -797,7 +797,7 @@
if( n1 + 6 != ssl->in_hslen || n1 != n2 )
{
SSL_DEBUG_MSG( 1, ( "bad certificate verify message" ) );
- return( XYSSL_ERR_SSL_BAD_HS_CERTIFICATE_VERIFY );
+ return( POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE_VERIFY );
}
ret = rsa_pkcs1_verify( &ssl->peer_cert->rsa, RSA_PUBLIC,
@@ -915,7 +915,7 @@
default:
SSL_DEBUG_MSG( 1, ( "invalid state %d", ssl->state ) );
- return( XYSSL_ERR_SSL_BAD_INPUT_DATA );
+ return( POLARSSL_ERR_SSL_BAD_INPUT_DATA );
}
if( ret != 0 )