diff options
author | jsing <> | 2015-09-11 18:08:21 +0000 |
---|---|---|
committer | jsing <> | 2015-09-11 18:08:21 +0000 |
commit | c42e261f37ac3f2934dd92296a095be3cbe461c1 (patch) | |
tree | 378accab3864084b0135769f8d9117e86df41845 /src/lib/libssl/s3_srvr.c | |
parent | 63eec788b454a03bda0826cf41f02edb6771089c (diff) | |
download | openbsd-c42e261f37ac3f2934dd92296a095be3cbe461c1.tar.gz openbsd-c42e261f37ac3f2934dd92296a095be3cbe461c1.tar.bz2 openbsd-c42e261f37ac3f2934dd92296a095be3cbe461c1.zip |
Rename functions that moved to t1_enc.c, with a tls1_ prefix instead of a
ssl3_ prefix.
ok beck@
Diffstat (limited to 'src/lib/libssl/s3_srvr.c')
-rw-r--r-- | src/lib/libssl/s3_srvr.c | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/src/lib/libssl/s3_srvr.c b/src/lib/libssl/s3_srvr.c index 4bbc160d58..da7f6d71cd 100644 --- a/src/lib/libssl/s3_srvr.c +++ b/src/lib/libssl/s3_srvr.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s3_srvr.c,v 1.117 2015/09/10 17:57:50 jsing Exp $ */ | 1 | /* $OpenBSD: s3_srvr.c,v 1.118 2015/09/11 18:08:21 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -239,7 +239,7 @@ ssl3_accept(SSL *s) | |||
239 | goto end; | 239 | goto end; |
240 | } | 240 | } |
241 | 241 | ||
242 | if (!ssl3_init_finished_mac(s)) { | 242 | if (!tls1_init_finished_mac(s)) { |
243 | ret = -1; | 243 | ret = -1; |
244 | goto end; | 244 | goto end; |
245 | } | 245 | } |
@@ -279,7 +279,7 @@ ssl3_accept(SSL *s) | |||
279 | s->state = SSL3_ST_SW_FLUSH; | 279 | s->state = SSL3_ST_SW_FLUSH; |
280 | s->init_num = 0; | 280 | s->init_num = 0; |
281 | 281 | ||
282 | if (!ssl3_init_finished_mac(s)) { | 282 | if (!tls1_init_finished_mac(s)) { |
283 | ret = -1; | 283 | ret = -1; |
284 | goto end; | 284 | goto end; |
285 | } | 285 | } |
@@ -393,7 +393,7 @@ ssl3_accept(SSL *s) | |||
393 | s->s3->tmp.cert_request = 0; | 393 | s->s3->tmp.cert_request = 0; |
394 | s->state = SSL3_ST_SW_SRVR_DONE_A; | 394 | s->state = SSL3_ST_SW_SRVR_DONE_A; |
395 | if (s->s3->handshake_buffer) | 395 | if (s->s3->handshake_buffer) |
396 | if (!ssl3_digest_cached_records(s)) | 396 | if (!tls1_digest_cached_records(s)) |
397 | return (-1); | 397 | return (-1); |
398 | } else { | 398 | } else { |
399 | s->s3->tmp.cert_request = 1; | 399 | s->s3->tmp.cert_request = 1; |
@@ -485,7 +485,7 @@ ssl3_accept(SSL *s) | |||
485 | return (-1); | 485 | return (-1); |
486 | } | 486 | } |
487 | s->s3->flags |= TLS1_FLAGS_KEEP_HANDSHAKE; | 487 | s->s3->flags |= TLS1_FLAGS_KEEP_HANDSHAKE; |
488 | if (!ssl3_digest_cached_records(s)) | 488 | if (!tls1_digest_cached_records(s)) |
489 | return (-1); | 489 | return (-1); |
490 | } else { | 490 | } else { |
491 | int offset = 0; | 491 | int offset = 0; |
@@ -502,7 +502,7 @@ ssl3_accept(SSL *s) | |||
502 | * But it is next step | 502 | * But it is next step |
503 | */ | 503 | */ |
504 | if (s->s3->handshake_buffer) | 504 | if (s->s3->handshake_buffer) |
505 | if (!ssl3_digest_cached_records(s)) | 505 | if (!tls1_digest_cached_records(s)) |
506 | return (-1); | 506 | return (-1); |
507 | for (dgst_num = 0; dgst_num < SSL_MAX_DIGEST; | 507 | for (dgst_num = 0; dgst_num < SSL_MAX_DIGEST; |
508 | dgst_num++) | 508 | dgst_num++) |
@@ -633,7 +633,7 @@ ssl3_accept(SSL *s) | |||
633 | 633 | ||
634 | case SSL_ST_OK: | 634 | case SSL_ST_OK: |
635 | /* clean a few things up */ | 635 | /* clean a few things up */ |
636 | ssl3_cleanup_key_block(s); | 636 | tls1_cleanup_key_block(s); |
637 | 637 | ||
638 | BUF_MEM_free(s->init_buf); | 638 | BUF_MEM_free(s->init_buf); |
639 | s->init_buf = NULL; | 639 | s->init_buf = NULL; |
@@ -1035,7 +1035,7 @@ ssl3_get_client_hello(SSL *s) | |||
1035 | alg_k = s->s3->tmp.new_cipher->algorithm_mkey; | 1035 | alg_k = s->s3->tmp.new_cipher->algorithm_mkey; |
1036 | if (!(SSL_USE_SIGALGS(s) || (alg_k & SSL_kGOST)) || | 1036 | if (!(SSL_USE_SIGALGS(s) || (alg_k & SSL_kGOST)) || |
1037 | !(s->verify_mode & SSL_VERIFY_PEER)) { | 1037 | !(s->verify_mode & SSL_VERIFY_PEER)) { |
1038 | if (!ssl3_digest_cached_records(s)) { | 1038 | if (!tls1_digest_cached_records(s)) { |
1039 | al = SSL_AD_INTERNAL_ERROR; | 1039 | al = SSL_AD_INTERNAL_ERROR; |
1040 | goto f_err; | 1040 | goto f_err; |
1041 | } | 1041 | } |
@@ -2384,7 +2384,7 @@ ssl3_get_client_certificate(SSL *s) | |||
2384 | goto f_err; | 2384 | goto f_err; |
2385 | } | 2385 | } |
2386 | /* No client certificate so digest cached records */ | 2386 | /* No client certificate so digest cached records */ |
2387 | if (s->s3->handshake_buffer && !ssl3_digest_cached_records(s)) { | 2387 | if (s->s3->handshake_buffer && !tls1_digest_cached_records(s)) { |
2388 | al = SSL_AD_INTERNAL_ERROR; | 2388 | al = SSL_AD_INTERNAL_ERROR; |
2389 | goto f_err; | 2389 | goto f_err; |
2390 | } | 2390 | } |