summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_pkt.c
diff options
context:
space:
mode:
authorjsing <>2021-03-24 18:44:00 +0000
committerjsing <>2021-03-24 18:44:00 +0000
commitae1702cd90dfc51fd5483baea6488cd99ac9c26b (patch)
tree4ba7ed86321d6c92257c882bce631aa4a7f603b8 /src/lib/libssl/ssl_pkt.c
parent3ce9712d99b47c9a9db840f6cf8cc970a5f841dd (diff)
downloadopenbsd-ae1702cd90dfc51fd5483baea6488cd99ac9c26b.tar.gz
openbsd-ae1702cd90dfc51fd5483baea6488cd99ac9c26b.tar.bz2
openbsd-ae1702cd90dfc51fd5483baea6488cd99ac9c26b.zip
Rename new_cipher to cipher.
This is in the SSL_HANDSHAKE struct and is what we're currently negotiating, so there is really nothing more "new" about the cipher than there is the key block or other parts of the handshake data. ok inoguchi@ tb@
Diffstat (limited to 'src/lib/libssl/ssl_pkt.c')
-rw-r--r--src/lib/libssl/ssl_pkt.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/src/lib/libssl/ssl_pkt.c b/src/lib/libssl/ssl_pkt.c
index 37bee9e69f..a93acdfa7f 100644
--- a/src/lib/libssl/ssl_pkt.c
+++ b/src/lib/libssl/ssl_pkt.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_pkt.c,v 1.38 2021/03/24 18:40:03 jsing Exp $ */ 1/* $OpenBSD: ssl_pkt.c,v 1.39 2021/03/24 18:44:00 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -1038,7 +1038,7 @@ ssl3_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek)
1038 } 1038 }
1039 1039
1040 /* Check we have a cipher to change to */ 1040 /* Check we have a cipher to change to */
1041 if (S3I(s)->hs.new_cipher == NULL) { 1041 if (S3I(s)->hs.cipher == NULL) {
1042 al = SSL_AD_UNEXPECTED_MESSAGE; 1042 al = SSL_AD_UNEXPECTED_MESSAGE;
1043 SSLerror(s, SSL_R_CCS_RECEIVED_EARLY); 1043 SSLerror(s, SSL_R_CCS_RECEIVED_EARLY);
1044 goto fatal_err; 1044 goto fatal_err;
@@ -1170,7 +1170,7 @@ ssl3_do_change_cipher_spec(SSL *s)
1170 return (0); 1170 return (0);
1171 } 1171 }
1172 1172
1173 s->session->cipher = S3I(s)->hs.new_cipher; 1173 s->session->cipher = S3I(s)->hs.cipher;
1174 if (!tls1_setup_key_block(s)) 1174 if (!tls1_setup_key_block(s))
1175 return (0); 1175 return (0);
1176 } 1176 }