diff options
| author | jsing <> | 2022-01-05 17:10:03 +0000 |
|---|---|---|
| committer | jsing <> | 2022-01-05 17:10:03 +0000 |
| commit | 767ff39662be70f355eac7cf069fd9c23c34580d (patch) | |
| tree | bf1d8f80a603da1e77e6fec1a2697b878680932b /src/lib/libssl/s3_lib.c | |
| parent | 2a4d455b5a48685d7473bacd6643c5f7fdfbe18a (diff) | |
| download | openbsd-767ff39662be70f355eac7cf069fd9c23c34580d.tar.gz openbsd-767ff39662be70f355eac7cf069fd9c23c34580d.tar.bz2 openbsd-767ff39662be70f355eac7cf069fd9c23c34580d.zip | |
Rename tls13_key_share to tls_key_share.
In preparation to use the key share code in both the TLSv1.3 and legacy
stacks, rename tls13_key_share to tls_key_share, moving it into the shared
handshake struct. Further changes will then allow the legacy stack to make
use of the same code for ephemeral key exchange.
ok inoguchi@ tb@
Diffstat (limited to 'src/lib/libssl/s3_lib.c')
| -rw-r--r-- | src/lib/libssl/s3_lib.c | 13 |
1 files changed, 7 insertions, 6 deletions
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c index 497dea6f08..b83a380547 100644 --- a/src/lib/libssl/s3_lib.c +++ b/src/lib/libssl/s3_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s3_lib.c,v 1.219 2021/11/02 13:59:29 tb Exp $ */ | 1 | /* $OpenBSD: s3_lib.c,v 1.220 2022/01/05 17:10:02 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1569,7 +1569,8 @@ ssl3_free(SSL *s) | |||
| 1569 | EC_KEY_free(S3I(s)->tmp.ecdh); | 1569 | EC_KEY_free(S3I(s)->tmp.ecdh); |
| 1570 | freezero(S3I(s)->tmp.x25519, X25519_KEY_LENGTH); | 1570 | freezero(S3I(s)->tmp.x25519, X25519_KEY_LENGTH); |
| 1571 | 1571 | ||
| 1572 | tls13_key_share_free(S3I(s)->hs.tls13.key_share); | 1572 | tls_key_share_free(S3I(s)->hs.key_share); |
| 1573 | |||
| 1573 | tls13_secrets_destroy(S3I(s)->hs.tls13.secrets); | 1574 | tls13_secrets_destroy(S3I(s)->hs.tls13.secrets); |
| 1574 | freezero(S3I(s)->hs.tls13.cookie, S3I(s)->hs.tls13.cookie_len); | 1575 | freezero(S3I(s)->hs.tls13.cookie, S3I(s)->hs.tls13.cookie_len); |
| 1575 | tls13_clienthello_hash_clear(&S3I(s)->hs.tls13); | 1576 | tls13_clienthello_hash_clear(&S3I(s)->hs.tls13); |
| @@ -1612,8 +1613,8 @@ ssl3_clear(SSL *s) | |||
| 1612 | S3I(s)->hs.sigalgs = NULL; | 1613 | S3I(s)->hs.sigalgs = NULL; |
| 1613 | S3I(s)->hs.sigalgs_len = 0; | 1614 | S3I(s)->hs.sigalgs_len = 0; |
| 1614 | 1615 | ||
| 1615 | tls13_key_share_free(S3I(s)->hs.tls13.key_share); | 1616 | tls_key_share_free(S3I(s)->hs.key_share); |
| 1616 | S3I(s)->hs.tls13.key_share = NULL; | 1617 | S3I(s)->hs.key_share = NULL; |
| 1617 | 1618 | ||
| 1618 | tls13_secrets_destroy(S3I(s)->hs.tls13.secrets); | 1619 | tls13_secrets_destroy(S3I(s)->hs.tls13.secrets); |
| 1619 | S3I(s)->hs.tls13.secrets = NULL; | 1620 | S3I(s)->hs.tls13.secrets = NULL; |
| @@ -1686,8 +1687,8 @@ _SSL_get_peer_tmp_key(SSL *s, EVP_PKEY **key) | |||
| 1686 | } else if (sc->peer_x25519_tmp != NULL) { | 1687 | } else if (sc->peer_x25519_tmp != NULL) { |
| 1687 | if (!ssl_kex_dummy_ecdhe_x25519(pkey)) | 1688 | if (!ssl_kex_dummy_ecdhe_x25519(pkey)) |
| 1688 | goto err; | 1689 | goto err; |
| 1689 | } else if (S3I(s)->hs.tls13.key_share != NULL) { | 1690 | } else if (S3I(s)->hs.key_share != NULL) { |
| 1690 | if (!tls13_key_share_peer_pkey(S3I(s)->hs.tls13.key_share, | 1691 | if (!tls_key_share_peer_pkey(S3I(s)->hs.key_share, |
| 1691 | pkey)) | 1692 | pkey)) |
| 1692 | goto err; | 1693 | goto err; |
| 1693 | } else { | 1694 | } else { |
