summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_locl.h
diff options
context:
space:
mode:
authorjsing <>2015-09-02 17:59:15 +0000
committerjsing <>2015-09-02 17:59:15 +0000
commit6979bbfe4fd79a2951b19171936b69968db66c1e (patch)
tree5ed4d431f7e35e43a4977f14c4711fe9c9af39e0 /src/lib/libssl/ssl_locl.h
parent7a0325c92218252068766465cba0cc0eb35d0c93 (diff)
downloadopenbsd-6979bbfe4fd79a2951b19171936b69968db66c1e.tar.gz
openbsd-6979bbfe4fd79a2951b19171936b69968db66c1e.tar.bz2
openbsd-6979bbfe4fd79a2951b19171936b69968db66c1e.zip
Replace dtls1_client_hello() with ssl3_client_hello() - both are basically
the same code, with two slight differences for DTLS handling. Also, make use of send_cookie to determine if the client random needs to be preserved, rather than testing if it is zeroed (hopefully your random number generator never returned all zeros, since the existing code would break). Inspired by BoringSSL. ok doug@
Diffstat (limited to 'src/lib/libssl/ssl_locl.h')
-rw-r--r--src/lib/libssl/ssl_locl.h3
1 files changed, 1 insertions, 2 deletions
diff --git a/src/lib/libssl/ssl_locl.h b/src/lib/libssl/ssl_locl.h
index b7853b24c8..8c8dec77b6 100644
--- a/src/lib/libssl/ssl_locl.h
+++ b/src/lib/libssl/ssl_locl.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_locl.h,v 1.102 2015/09/01 13:38:27 jsing Exp $ */ 1/* $OpenBSD: ssl_locl.h,v 1.103 2015/09/02 17:59:15 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -729,7 +729,6 @@ int ssl3_check_cert_and_algorithm(SSL *s);
729int ssl3_check_finished(SSL *s); 729int ssl3_check_finished(SSL *s);
730int ssl3_send_next_proto(SSL *s); 730int ssl3_send_next_proto(SSL *s);
731 731
732int dtls1_client_hello(SSL *s);
733int dtls1_send_client_certificate(SSL *s); 732int dtls1_send_client_certificate(SSL *s);
734int dtls1_send_client_key_exchange(SSL *s); 733int dtls1_send_client_key_exchange(SSL *s);
735int dtls1_send_client_verify(SSL *s); 734int dtls1_send_client_verify(SSL *s);