diff options
author | jsing <> | 2022-01-07 15:46:30 +0000 |
---|---|---|
committer | jsing <> | 2022-01-07 15:46:30 +0000 |
commit | 3f7702534a377e0a3b33a6681df0af8a57adbc57 (patch) | |
tree | 270b59705c9d4efa145c0649cce3fa41750939d9 /src/lib/libssl/ssl_locl.h | |
parent | a42b07afac78ec75467b5a5ca9fcbbdaf9d093a4 (diff) | |
download | openbsd-3f7702534a377e0a3b33a6681df0af8a57adbc57.tar.gz openbsd-3f7702534a377e0a3b33a6681df0af8a57adbc57.tar.bz2 openbsd-3f7702534a377e0a3b33a6681df0af8a57adbc57.zip |
Convert legacy server to tls_key_share.
This requires a few more additions to the DHE key share code - we need to
be able to either set the DHE parameters or specify the number of key bits
for use with auto DHE parameters. Additionally, we need to be able to
serialise the DHE parameters to send to the client.
This removes the infamous 'tmp' struct from ssl3_state_internal_st.
ok inoguchi@ tb@
Diffstat (limited to 'src/lib/libssl/ssl_locl.h')
-rw-r--r-- | src/lib/libssl/ssl_locl.h | 11 |
1 files changed, 1 insertions, 10 deletions
diff --git a/src/lib/libssl/ssl_locl.h b/src/lib/libssl/ssl_locl.h index 83b40d2dd3..cc7b342247 100644 --- a/src/lib/libssl/ssl_locl.h +++ b/src/lib/libssl/ssl_locl.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_locl.h,v 1.374 2022/01/06 18:23:56 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_locl.h,v 1.375 2022/01/07 15:46:30 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -1168,15 +1168,6 @@ typedef struct ssl3_state_internal_st { | |||
1168 | 1168 | ||
1169 | SSL_HANDSHAKE hs; | 1169 | SSL_HANDSHAKE hs; |
1170 | 1170 | ||
1171 | struct { | ||
1172 | DH *dh; | ||
1173 | |||
1174 | EC_KEY *ecdh; /* holds short lived ECDH key */ | ||
1175 | int ecdh_nid; | ||
1176 | |||
1177 | uint8_t *x25519; | ||
1178 | } tmp; | ||
1179 | |||
1180 | /* Connection binding to prevent renegotiation attacks */ | 1171 | /* Connection binding to prevent renegotiation attacks */ |
1181 | unsigned char previous_client_finished[EVP_MAX_MD_SIZE]; | 1172 | unsigned char previous_client_finished[EVP_MAX_MD_SIZE]; |
1182 | unsigned char previous_client_finished_len; | 1173 | unsigned char previous_client_finished_len; |