diff options
author | jsing <> | 2021-03-24 18:44:00 +0000 |
---|---|---|
committer | jsing <> | 2021-03-24 18:44:00 +0000 |
commit | ae1702cd90dfc51fd5483baea6488cd99ac9c26b (patch) | |
tree | 4ba7ed86321d6c92257c882bce631aa4a7f603b8 /src/lib/libssl/ssl_lib.c | |
parent | 3ce9712d99b47c9a9db840f6cf8cc970a5f841dd (diff) | |
download | openbsd-ae1702cd90dfc51fd5483baea6488cd99ac9c26b.tar.gz openbsd-ae1702cd90dfc51fd5483baea6488cd99ac9c26b.tar.bz2 openbsd-ae1702cd90dfc51fd5483baea6488cd99ac9c26b.zip |
Rename new_cipher to cipher.
This is in the SSL_HANDSHAKE struct and is what we're currently
negotiating, so there is really nothing more "new" about the cipher
than there is the key block or other parts of the handshake data.
ok inoguchi@ tb@
Diffstat (limited to 'src/lib/libssl/ssl_lib.c')
-rw-r--r-- | src/lib/libssl/ssl_lib.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/src/lib/libssl/ssl_lib.c b/src/lib/libssl/ssl_lib.c index 4b215a786d..e3e0c974af 100644 --- a/src/lib/libssl/ssl_lib.c +++ b/src/lib/libssl/ssl_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_lib.c,v 1.251 2021/03/02 15:43:12 tb Exp $ */ | 1 | /* $OpenBSD: ssl_lib.c,v 1.252 2021/03/24 18:44:00 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -2111,8 +2111,8 @@ ssl_using_ecc_cipher(SSL *s) | |||
2111 | { | 2111 | { |
2112 | unsigned long alg_a, alg_k; | 2112 | unsigned long alg_a, alg_k; |
2113 | 2113 | ||
2114 | alg_a = S3I(s)->hs.new_cipher->algorithm_auth; | 2114 | alg_a = S3I(s)->hs.cipher->algorithm_auth; |
2115 | alg_k = S3I(s)->hs.new_cipher->algorithm_mkey; | 2115 | alg_k = S3I(s)->hs.cipher->algorithm_mkey; |
2116 | 2116 | ||
2117 | return SSI(s)->tlsext_ecpointformatlist != NULL && | 2117 | return SSI(s)->tlsext_ecpointformatlist != NULL && |
2118 | SSI(s)->tlsext_ecpointformatlist_length > 0 && | 2118 | SSI(s)->tlsext_ecpointformatlist_length > 0 && |
@@ -2122,7 +2122,7 @@ ssl_using_ecc_cipher(SSL *s) | |||
2122 | int | 2122 | int |
2123 | ssl_check_srvr_ecc_cert_and_alg(X509 *x, SSL *s) | 2123 | ssl_check_srvr_ecc_cert_and_alg(X509 *x, SSL *s) |
2124 | { | 2124 | { |
2125 | const SSL_CIPHER *cs = S3I(s)->hs.new_cipher; | 2125 | const SSL_CIPHER *cs = S3I(s)->hs.cipher; |
2126 | unsigned long alg_a; | 2126 | unsigned long alg_a; |
2127 | 2127 | ||
2128 | alg_a = cs->algorithm_auth; | 2128 | alg_a = cs->algorithm_auth; |
@@ -2150,9 +2150,9 @@ ssl_get_server_send_pkey(const SSL *s) | |||
2150 | int i; | 2150 | int i; |
2151 | 2151 | ||
2152 | c = s->cert; | 2152 | c = s->cert; |
2153 | ssl_set_cert_masks(c, S3I(s)->hs.new_cipher); | 2153 | ssl_set_cert_masks(c, S3I(s)->hs.cipher); |
2154 | 2154 | ||
2155 | alg_a = S3I(s)->hs.new_cipher->algorithm_auth; | 2155 | alg_a = S3I(s)->hs.cipher->algorithm_auth; |
2156 | 2156 | ||
2157 | if (alg_a & SSL_aECDSA) { | 2157 | if (alg_a & SSL_aECDSA) { |
2158 | i = SSL_PKEY_ECC; | 2158 | i = SSL_PKEY_ECC; |
@@ -2211,9 +2211,9 @@ ssl_get_auto_dh(SSL *s) | |||
2211 | 2211 | ||
2212 | if (s->cert->dh_tmp_auto == 2) { | 2212 | if (s->cert->dh_tmp_auto == 2) { |
2213 | keylen = 1024; | 2213 | keylen = 1024; |
2214 | } else if (S3I(s)->hs.new_cipher->algorithm_auth & SSL_aNULL) { | 2214 | } else if (S3I(s)->hs.cipher->algorithm_auth & SSL_aNULL) { |
2215 | keylen = 1024; | 2215 | keylen = 1024; |
2216 | if (S3I(s)->hs.new_cipher->strength_bits == 256) | 2216 | if (S3I(s)->hs.cipher->strength_bits == 256) |
2217 | keylen = 3072; | 2217 | keylen = 3072; |
2218 | } else { | 2218 | } else { |
2219 | if ((cpk = ssl_get_server_send_pkey(s)) == NULL) | 2219 | if ((cpk = ssl_get_server_send_pkey(s)) == NULL) |