summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_lib.c
diff options
context:
space:
mode:
authorjsing <>2022-01-05 17:10:03 +0000
committerjsing <>2022-01-05 17:10:03 +0000
commita9f24628df539c8088b9794446120c0373037961 (patch)
treebf1d8f80a603da1e77e6fec1a2697b878680932b /src/lib/libssl/s3_lib.c
parentc07b503037c3e655a5473421e41fdca747aaad80 (diff)
downloadopenbsd-a9f24628df539c8088b9794446120c0373037961.tar.gz
openbsd-a9f24628df539c8088b9794446120c0373037961.tar.bz2
openbsd-a9f24628df539c8088b9794446120c0373037961.zip
Rename tls13_key_share to tls_key_share.
In preparation to use the key share code in both the TLSv1.3 and legacy stacks, rename tls13_key_share to tls_key_share, moving it into the shared handshake struct. Further changes will then allow the legacy stack to make use of the same code for ephemeral key exchange. ok inoguchi@ tb@
Diffstat (limited to 'src/lib/libssl/s3_lib.c')
-rw-r--r--src/lib/libssl/s3_lib.c13
1 files changed, 7 insertions, 6 deletions
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c
index 497dea6f08..b83a380547 100644
--- a/src/lib/libssl/s3_lib.c
+++ b/src/lib/libssl/s3_lib.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: s3_lib.c,v 1.219 2021/11/02 13:59:29 tb Exp $ */ 1/* $OpenBSD: s3_lib.c,v 1.220 2022/01/05 17:10:02 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -1569,7 +1569,8 @@ ssl3_free(SSL *s)
1569 EC_KEY_free(S3I(s)->tmp.ecdh); 1569 EC_KEY_free(S3I(s)->tmp.ecdh);
1570 freezero(S3I(s)->tmp.x25519, X25519_KEY_LENGTH); 1570 freezero(S3I(s)->tmp.x25519, X25519_KEY_LENGTH);
1571 1571
1572 tls13_key_share_free(S3I(s)->hs.tls13.key_share); 1572 tls_key_share_free(S3I(s)->hs.key_share);
1573
1573 tls13_secrets_destroy(S3I(s)->hs.tls13.secrets); 1574 tls13_secrets_destroy(S3I(s)->hs.tls13.secrets);
1574 freezero(S3I(s)->hs.tls13.cookie, S3I(s)->hs.tls13.cookie_len); 1575 freezero(S3I(s)->hs.tls13.cookie, S3I(s)->hs.tls13.cookie_len);
1575 tls13_clienthello_hash_clear(&S3I(s)->hs.tls13); 1576 tls13_clienthello_hash_clear(&S3I(s)->hs.tls13);
@@ -1612,8 +1613,8 @@ ssl3_clear(SSL *s)
1612 S3I(s)->hs.sigalgs = NULL; 1613 S3I(s)->hs.sigalgs = NULL;
1613 S3I(s)->hs.sigalgs_len = 0; 1614 S3I(s)->hs.sigalgs_len = 0;
1614 1615
1615 tls13_key_share_free(S3I(s)->hs.tls13.key_share); 1616 tls_key_share_free(S3I(s)->hs.key_share);
1616 S3I(s)->hs.tls13.key_share = NULL; 1617 S3I(s)->hs.key_share = NULL;
1617 1618
1618 tls13_secrets_destroy(S3I(s)->hs.tls13.secrets); 1619 tls13_secrets_destroy(S3I(s)->hs.tls13.secrets);
1619 S3I(s)->hs.tls13.secrets = NULL; 1620 S3I(s)->hs.tls13.secrets = NULL;
@@ -1686,8 +1687,8 @@ _SSL_get_peer_tmp_key(SSL *s, EVP_PKEY **key)
1686 } else if (sc->peer_x25519_tmp != NULL) { 1687 } else if (sc->peer_x25519_tmp != NULL) {
1687 if (!ssl_kex_dummy_ecdhe_x25519(pkey)) 1688 if (!ssl_kex_dummy_ecdhe_x25519(pkey))
1688 goto err; 1689 goto err;
1689 } else if (S3I(s)->hs.tls13.key_share != NULL) { 1690 } else if (S3I(s)->hs.key_share != NULL) {
1690 if (!tls13_key_share_peer_pkey(S3I(s)->hs.tls13.key_share, 1691 if (!tls_key_share_peer_pkey(S3I(s)->hs.key_share,
1691 pkey)) 1692 pkey))
1692 goto err; 1693 goto err;
1693 } else { 1694 } else {