diff options
| author | jsing <> | 2019-02-09 15:26:15 +0000 |
|---|---|---|
| committer | jsing <> | 2019-02-09 15:26:15 +0000 |
| commit | bf3fc1487ab4d49b366d075e6f48ee4eef2d29a4 (patch) | |
| tree | ccde70d521f0e94dd1570fd0a07f27a5b4ca631e /src/lib/libssl/ssl_clnt.c | |
| parent | 697813b6701818d308182e24502b82a16067be78 (diff) | |
| download | openbsd-bf3fc1487ab4d49b366d075e6f48ee4eef2d29a4.tar.gz openbsd-bf3fc1487ab4d49b366d075e6f48ee4eef2d29a4.tar.bz2 openbsd-bf3fc1487ab4d49b366d075e6f48ee4eef2d29a4.zip | |
Rename tls1_handshake_hash*() to tls1_transcript_hash*().
While handshake hash is correct (in as far as it is a hash of handshake
messages), using tls1_transcript_hash*() aligns them with the naming of the
tls1_transcript*() functions. Additionally, the TLSv1.3 specification uses
Transcript-Hash and "transcript hash", which this matches.
ok inoguchi@ tb@
Diffstat (limited to 'src/lib/libssl/ssl_clnt.c')
| -rw-r--r-- | src/lib/libssl/ssl_clnt.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/lib/libssl/ssl_clnt.c b/src/lib/libssl/ssl_clnt.c index e9e900b643..abdcc9791a 100644 --- a/src/lib/libssl/ssl_clnt.c +++ b/src/lib/libssl/ssl_clnt.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_clnt.c,v 1.55 2019/01/23 18:39:28 beck Exp $ */ | 1 | /* $OpenBSD: ssl_clnt.c,v 1.56 2019/02/09 15:26:15 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -979,7 +979,7 @@ ssl3_get_server_hello(SSL *s) | |||
| 979 | } | 979 | } |
| 980 | S3I(s)->hs.new_cipher = cipher; | 980 | S3I(s)->hs.new_cipher = cipher; |
| 981 | 981 | ||
| 982 | if (!tls1_handshake_hash_init(s)) | 982 | if (!tls1_transcript_hash_init(s)) |
| 983 | goto err; | 983 | goto err; |
| 984 | 984 | ||
| 985 | /* | 985 | /* |
| @@ -2446,7 +2446,7 @@ ssl3_send_client_verify_rsa(SSL *s, CBB *cert_verify) | |||
| 2446 | unsigned int signature_len = 0; | 2446 | unsigned int signature_len = 0; |
| 2447 | int ret = 0; | 2447 | int ret = 0; |
| 2448 | 2448 | ||
| 2449 | if (!tls1_handshake_hash_value(s, data, sizeof(data), NULL)) | 2449 | if (!tls1_transcript_hash_value(s, data, sizeof(data), NULL)) |
| 2450 | goto err; | 2450 | goto err; |
| 2451 | 2451 | ||
| 2452 | pkey = s->cert->key->privatekey; | 2452 | pkey = s->cert->key->privatekey; |
| @@ -2481,7 +2481,7 @@ ssl3_send_client_verify_ec(SSL *s, CBB *cert_verify) | |||
| 2481 | unsigned int signature_len = 0; | 2481 | unsigned int signature_len = 0; |
| 2482 | int ret = 0; | 2482 | int ret = 0; |
| 2483 | 2483 | ||
| 2484 | if (!tls1_handshake_hash_value(s, data, sizeof(data), NULL)) | 2484 | if (!tls1_transcript_hash_value(s, data, sizeof(data), NULL)) |
| 2485 | goto err; | 2485 | goto err; |
| 2486 | 2486 | ||
| 2487 | pkey = s->cert->key->privatekey; | 2487 | pkey = s->cert->key->privatekey; |
