diff options
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libssl/s3_srvr.c | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/src/lib/libssl/s3_srvr.c b/src/lib/libssl/s3_srvr.c index e0a7d78995..8d47a16b55 100644 --- a/src/lib/libssl/s3_srvr.c +++ b/src/lib/libssl/s3_srvr.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s3_srvr.c,v 1.77 2014/07/12 13:11:53 jsing Exp $ */ | 1 | /* $OpenBSD: s3_srvr.c,v 1.78 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -422,8 +422,8 @@ ssl3_accept(SSL *s) | |||
| 422 | * public key for key exchange. | 422 | * public key for key exchange. |
| 423 | */ | 423 | */ |
| 424 | if (s->s3->tmp.use_rsa_tmp || | 424 | if (s->s3->tmp.use_rsa_tmp || |
| 425 | (alg_k & (SSL_kDHr|SSL_kDHd|SSL_kEDH)) || | 425 | (alg_k & (SSL_kDHr|SSL_kDHd|SSL_kDHE)) || |
| 426 | (alg_k & SSL_kEECDH) || | 426 | (alg_k & SSL_kECDHE) || |
| 427 | ((alg_k & SSL_kRSA) && | 427 | ((alg_k & SSL_kRSA) && |
| 428 | (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == | 428 | (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == |
| 429 | NULL))) { | 429 | NULL))) { |
| @@ -1416,7 +1416,7 @@ ssl3_send_server_key_exchange(SSL *s) | |||
| 1416 | r[1] = rsa->e; | 1416 | r[1] = rsa->e; |
| 1417 | s->s3->tmp.use_rsa_tmp = 1; | 1417 | s->s3->tmp.use_rsa_tmp = 1; |
| 1418 | } else | 1418 | } else |
| 1419 | if (type & SSL_kEDH) { | 1419 | if (type & SSL_kDHE) { |
| 1420 | dhp = cert->dh_tmp; | 1420 | dhp = cert->dh_tmp; |
| 1421 | if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL)) | 1421 | if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL)) |
| 1422 | dhp = s->cert->dh_tmp_cb(s, 0, 0); | 1422 | dhp = s->cert->dh_tmp_cb(s, 0, 0); |
| @@ -1463,7 +1463,7 @@ ssl3_send_server_key_exchange(SSL *s) | |||
| 1463 | r[1] = dh->g; | 1463 | r[1] = dh->g; |
| 1464 | r[2] = dh->pub_key; | 1464 | r[2] = dh->pub_key; |
| 1465 | } else | 1465 | } else |
| 1466 | if (type & SSL_kEECDH) { | 1466 | if (type & SSL_kECDHE) { |
| 1467 | const EC_GROUP *group; | 1467 | const EC_GROUP *group; |
| 1468 | 1468 | ||
| 1469 | ecdhp = cert->ecdh_tmp; | 1469 | ecdhp = cert->ecdh_tmp; |
| @@ -1614,7 +1614,7 @@ ssl3_send_server_key_exchange(SSL *s) | |||
| 1614 | p += nr[i]; | 1614 | p += nr[i]; |
| 1615 | } | 1615 | } |
| 1616 | 1616 | ||
| 1617 | if (type & SSL_kEECDH) { | 1617 | if (type & SSL_kECDHE) { |
| 1618 | /* | 1618 | /* |
| 1619 | * XXX: For now, we only support named (not generic) | 1619 | * XXX: For now, we only support named (not generic) |
| 1620 | * curves. | 1620 | * curves. |
| @@ -1968,7 +1968,7 @@ ssl3_get_client_key_exchange(SSL *s) | |||
| 1968 | p, i); | 1968 | p, i); |
| 1969 | OPENSSL_cleanse(p, i); | 1969 | OPENSSL_cleanse(p, i); |
| 1970 | } else | 1970 | } else |
| 1971 | if (alg_k & (SSL_kEDH|SSL_kDHr|SSL_kDHd)) { | 1971 | if (alg_k & (SSL_kDHE|SSL_kDHr|SSL_kDHd)) { |
| 1972 | if (2 > n) | 1972 | if (2 > n) |
| 1973 | goto truncated; | 1973 | goto truncated; |
| 1974 | n2s(p, i); | 1974 | n2s(p, i); |
| @@ -2026,7 +2026,7 @@ ssl3_get_client_key_exchange(SSL *s) | |||
| 2026 | OPENSSL_cleanse(p, i); | 2026 | OPENSSL_cleanse(p, i); |
| 2027 | } else | 2027 | } else |
| 2028 | 2028 | ||
| 2029 | if (alg_k & (SSL_kEECDH|SSL_kECDHr|SSL_kECDHe)) { | 2029 | if (alg_k & (SSL_kECDHE|SSL_kECDHr|SSL_kECDHe)) { |
| 2030 | int ret = 1; | 2030 | int ret = 1; |
| 2031 | int field_size = 0; | 2031 | int field_size = 0; |
| 2032 | const EC_KEY *tkey; | 2032 | const EC_KEY *tkey; |
| @@ -2072,7 +2072,7 @@ ssl3_get_client_key_exchange(SSL *s) | |||
| 2072 | if (n == 0L) { | 2072 | if (n == 0L) { |
| 2073 | /* Client Publickey was in Client Certificate */ | 2073 | /* Client Publickey was in Client Certificate */ |
| 2074 | 2074 | ||
| 2075 | if (alg_k & SSL_kEECDH) { | 2075 | if (alg_k & SSL_kECDHE) { |
| 2076 | al = SSL_AD_HANDSHAKE_FAILURE; | 2076 | al = SSL_AD_HANDSHAKE_FAILURE; |
| 2077 | SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE, | 2077 | SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE, |
| 2078 | SSL_R_MISSING_TMP_ECDH_KEY); | 2078 | SSL_R_MISSING_TMP_ECDH_KEY); |
