summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_lib.c
diff options
context:
space:
mode:
authorjsing <>2021-03-24 18:44:00 +0000
committerjsing <>2021-03-24 18:44:00 +0000
commitae1702cd90dfc51fd5483baea6488cd99ac9c26b (patch)
tree4ba7ed86321d6c92257c882bce631aa4a7f603b8 /src/lib/libssl/ssl_lib.c
parent3ce9712d99b47c9a9db840f6cf8cc970a5f841dd (diff)
downloadopenbsd-ae1702cd90dfc51fd5483baea6488cd99ac9c26b.tar.gz
openbsd-ae1702cd90dfc51fd5483baea6488cd99ac9c26b.tar.bz2
openbsd-ae1702cd90dfc51fd5483baea6488cd99ac9c26b.zip
Rename new_cipher to cipher.
This is in the SSL_HANDSHAKE struct and is what we're currently negotiating, so there is really nothing more "new" about the cipher than there is the key block or other parts of the handshake data. ok inoguchi@ tb@
Diffstat (limited to 'src/lib/libssl/ssl_lib.c')
-rw-r--r--src/lib/libssl/ssl_lib.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/src/lib/libssl/ssl_lib.c b/src/lib/libssl/ssl_lib.c
index 4b215a786d..e3e0c974af 100644
--- a/src/lib/libssl/ssl_lib.c
+++ b/src/lib/libssl/ssl_lib.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_lib.c,v 1.251 2021/03/02 15:43:12 tb Exp $ */ 1/* $OpenBSD: ssl_lib.c,v 1.252 2021/03/24 18:44:00 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -2111,8 +2111,8 @@ ssl_using_ecc_cipher(SSL *s)
2111{ 2111{
2112 unsigned long alg_a, alg_k; 2112 unsigned long alg_a, alg_k;
2113 2113
2114 alg_a = S3I(s)->hs.new_cipher->algorithm_auth; 2114 alg_a = S3I(s)->hs.cipher->algorithm_auth;
2115 alg_k = S3I(s)->hs.new_cipher->algorithm_mkey; 2115 alg_k = S3I(s)->hs.cipher->algorithm_mkey;
2116 2116
2117 return SSI(s)->tlsext_ecpointformatlist != NULL && 2117 return SSI(s)->tlsext_ecpointformatlist != NULL &&
2118 SSI(s)->tlsext_ecpointformatlist_length > 0 && 2118 SSI(s)->tlsext_ecpointformatlist_length > 0 &&
@@ -2122,7 +2122,7 @@ ssl_using_ecc_cipher(SSL *s)
2122int 2122int
2123ssl_check_srvr_ecc_cert_and_alg(X509 *x, SSL *s) 2123ssl_check_srvr_ecc_cert_and_alg(X509 *x, SSL *s)
2124{ 2124{
2125 const SSL_CIPHER *cs = S3I(s)->hs.new_cipher; 2125 const SSL_CIPHER *cs = S3I(s)->hs.cipher;
2126 unsigned long alg_a; 2126 unsigned long alg_a;
2127 2127
2128 alg_a = cs->algorithm_auth; 2128 alg_a = cs->algorithm_auth;
@@ -2150,9 +2150,9 @@ ssl_get_server_send_pkey(const SSL *s)
2150 int i; 2150 int i;
2151 2151
2152 c = s->cert; 2152 c = s->cert;
2153 ssl_set_cert_masks(c, S3I(s)->hs.new_cipher); 2153 ssl_set_cert_masks(c, S3I(s)->hs.cipher);
2154 2154
2155 alg_a = S3I(s)->hs.new_cipher->algorithm_auth; 2155 alg_a = S3I(s)->hs.cipher->algorithm_auth;
2156 2156
2157 if (alg_a & SSL_aECDSA) { 2157 if (alg_a & SSL_aECDSA) {
2158 i = SSL_PKEY_ECC; 2158 i = SSL_PKEY_ECC;
@@ -2211,9 +2211,9 @@ ssl_get_auto_dh(SSL *s)
2211 2211
2212 if (s->cert->dh_tmp_auto == 2) { 2212 if (s->cert->dh_tmp_auto == 2) {
2213 keylen = 1024; 2213 keylen = 1024;
2214 } else if (S3I(s)->hs.new_cipher->algorithm_auth & SSL_aNULL) { 2214 } else if (S3I(s)->hs.cipher->algorithm_auth & SSL_aNULL) {
2215 keylen = 1024; 2215 keylen = 1024;
2216 if (S3I(s)->hs.new_cipher->strength_bits == 256) 2216 if (S3I(s)->hs.cipher->strength_bits == 256)
2217 keylen = 3072; 2217 keylen = 3072;
2218 } else { 2218 } else {
2219 if ((cpk = ssl_get_server_send_pkey(s)) == NULL) 2219 if ((cpk = ssl_get_server_send_pkey(s)) == NULL)