summaryrefslogtreecommitdiff
path: root/src/lib/libssl/tls13_client.c
diff options
context:
space:
mode:
authorjsing <>2021-03-24 18:44:00 +0000
committerjsing <>2021-03-24 18:44:00 +0000
commitae1702cd90dfc51fd5483baea6488cd99ac9c26b (patch)
tree4ba7ed86321d6c92257c882bce631aa4a7f603b8 /src/lib/libssl/tls13_client.c
parent3ce9712d99b47c9a9db840f6cf8cc970a5f841dd (diff)
downloadopenbsd-ae1702cd90dfc51fd5483baea6488cd99ac9c26b.tar.gz
openbsd-ae1702cd90dfc51fd5483baea6488cd99ac9c26b.tar.bz2
openbsd-ae1702cd90dfc51fd5483baea6488cd99ac9c26b.zip
Rename new_cipher to cipher.
This is in the SSL_HANDSHAKE struct and is what we're currently negotiating, so there is really nothing more "new" about the cipher than there is the key block or other parts of the handshake data. ok inoguchi@ tb@
Diffstat (limited to 'src/lib/libssl/tls13_client.c')
-rw-r--r--src/lib/libssl/tls13_client.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/src/lib/libssl/tls13_client.c b/src/lib/libssl/tls13_client.c
index 0f3d435c94..78bf15ec59 100644
--- a/src/lib/libssl/tls13_client.c
+++ b/src/lib/libssl/tls13_client.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls13_client.c,v 1.75 2021/03/21 18:36:34 jsing Exp $ */ 1/* $OpenBSD: tls13_client.c,v 1.76 2021/03/24 18:44:00 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org>
4 * 4 *
@@ -304,7 +304,7 @@ tls13_server_hello_process(struct tls13_ctx *ctx, CBS *cbs)
304 goto err; 304 goto err;
305 } 305 }
306 /* XXX - move this to hs.tls13? */ 306 /* XXX - move this to hs.tls13? */
307 ctx->hs->new_cipher = cipher; 307 ctx->hs->cipher = cipher;
308 308
309 if (compression_method != 0) { 309 if (compression_method != 0) {
310 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER; 310 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER;
@@ -338,12 +338,12 @@ tls13_client_engage_record_protection(struct tls13_ctx *ctx)
338 &shared_key_len)) 338 &shared_key_len))
339 goto err; 339 goto err;
340 340
341 s->session->cipher = ctx->hs->new_cipher; 341 s->session->cipher = ctx->hs->cipher;
342 s->session->ssl_version = ctx->hs->tls13.server_version; 342 s->session->ssl_version = ctx->hs->tls13.server_version;
343 343
344 if ((ctx->aead = tls13_cipher_aead(ctx->hs->new_cipher)) == NULL) 344 if ((ctx->aead = tls13_cipher_aead(ctx->hs->cipher)) == NULL)
345 goto err; 345 goto err;
346 if ((ctx->hash = tls13_cipher_hash(ctx->hs->new_cipher)) == NULL) 346 if ((ctx->hash = tls13_cipher_hash(ctx->hs->cipher)) == NULL)
347 goto err; 347 goto err;
348 348
349 if ((secrets = tls13_secrets_create(ctx->hash, 0)) == NULL) 349 if ((secrets = tls13_secrets_create(ctx->hash, 0)) == NULL)