diff options
author | jsing <> | 2022-01-05 17:10:03 +0000 |
---|---|---|
committer | jsing <> | 2022-01-05 17:10:03 +0000 |
commit | a9f24628df539c8088b9794446120c0373037961 (patch) | |
tree | bf1d8f80a603da1e77e6fec1a2697b878680932b /src/lib/libssl/s3_lib.c | |
parent | c07b503037c3e655a5473421e41fdca747aaad80 (diff) | |
download | openbsd-a9f24628df539c8088b9794446120c0373037961.tar.gz openbsd-a9f24628df539c8088b9794446120c0373037961.tar.bz2 openbsd-a9f24628df539c8088b9794446120c0373037961.zip |
Rename tls13_key_share to tls_key_share.
In preparation to use the key share code in both the TLSv1.3 and legacy
stacks, rename tls13_key_share to tls_key_share, moving it into the shared
handshake struct. Further changes will then allow the legacy stack to make
use of the same code for ephemeral key exchange.
ok inoguchi@ tb@
Diffstat (limited to 'src/lib/libssl/s3_lib.c')
-rw-r--r-- | src/lib/libssl/s3_lib.c | 13 |
1 files changed, 7 insertions, 6 deletions
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c index 497dea6f08..b83a380547 100644 --- a/src/lib/libssl/s3_lib.c +++ b/src/lib/libssl/s3_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s3_lib.c,v 1.219 2021/11/02 13:59:29 tb Exp $ */ | 1 | /* $OpenBSD: s3_lib.c,v 1.220 2022/01/05 17:10:02 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -1569,7 +1569,8 @@ ssl3_free(SSL *s) | |||
1569 | EC_KEY_free(S3I(s)->tmp.ecdh); | 1569 | EC_KEY_free(S3I(s)->tmp.ecdh); |
1570 | freezero(S3I(s)->tmp.x25519, X25519_KEY_LENGTH); | 1570 | freezero(S3I(s)->tmp.x25519, X25519_KEY_LENGTH); |
1571 | 1571 | ||
1572 | tls13_key_share_free(S3I(s)->hs.tls13.key_share); | 1572 | tls_key_share_free(S3I(s)->hs.key_share); |
1573 | |||
1573 | tls13_secrets_destroy(S3I(s)->hs.tls13.secrets); | 1574 | tls13_secrets_destroy(S3I(s)->hs.tls13.secrets); |
1574 | freezero(S3I(s)->hs.tls13.cookie, S3I(s)->hs.tls13.cookie_len); | 1575 | freezero(S3I(s)->hs.tls13.cookie, S3I(s)->hs.tls13.cookie_len); |
1575 | tls13_clienthello_hash_clear(&S3I(s)->hs.tls13); | 1576 | tls13_clienthello_hash_clear(&S3I(s)->hs.tls13); |
@@ -1612,8 +1613,8 @@ ssl3_clear(SSL *s) | |||
1612 | S3I(s)->hs.sigalgs = NULL; | 1613 | S3I(s)->hs.sigalgs = NULL; |
1613 | S3I(s)->hs.sigalgs_len = 0; | 1614 | S3I(s)->hs.sigalgs_len = 0; |
1614 | 1615 | ||
1615 | tls13_key_share_free(S3I(s)->hs.tls13.key_share); | 1616 | tls_key_share_free(S3I(s)->hs.key_share); |
1616 | S3I(s)->hs.tls13.key_share = NULL; | 1617 | S3I(s)->hs.key_share = NULL; |
1617 | 1618 | ||
1618 | tls13_secrets_destroy(S3I(s)->hs.tls13.secrets); | 1619 | tls13_secrets_destroy(S3I(s)->hs.tls13.secrets); |
1619 | S3I(s)->hs.tls13.secrets = NULL; | 1620 | S3I(s)->hs.tls13.secrets = NULL; |
@@ -1686,8 +1687,8 @@ _SSL_get_peer_tmp_key(SSL *s, EVP_PKEY **key) | |||
1686 | } else if (sc->peer_x25519_tmp != NULL) { | 1687 | } else if (sc->peer_x25519_tmp != NULL) { |
1687 | if (!ssl_kex_dummy_ecdhe_x25519(pkey)) | 1688 | if (!ssl_kex_dummy_ecdhe_x25519(pkey)) |
1688 | goto err; | 1689 | goto err; |
1689 | } else if (S3I(s)->hs.tls13.key_share != NULL) { | 1690 | } else if (S3I(s)->hs.key_share != NULL) { |
1690 | if (!tls13_key_share_peer_pkey(S3I(s)->hs.tls13.key_share, | 1691 | if (!tls_key_share_peer_pkey(S3I(s)->hs.key_share, |
1691 | pkey)) | 1692 | pkey)) |
1692 | goto err; | 1693 | goto err; |
1693 | } else { | 1694 | } else { |