summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_srvr.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/s3_srvr.c')
-rw-r--r--src/lib/libssl/s3_srvr.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/src/lib/libssl/s3_srvr.c b/src/lib/libssl/s3_srvr.c
index e0a7d78995..8d47a16b55 100644
--- a/src/lib/libssl/s3_srvr.c
+++ b/src/lib/libssl/s3_srvr.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: s3_srvr.c,v 1.77 2014/07/12 13:11:53 jsing Exp $ */ 1/* $OpenBSD: s3_srvr.c,v 1.78 2014/07/12 22:33:39 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -422,8 +422,8 @@ ssl3_accept(SSL *s)
422 * public key for key exchange. 422 * public key for key exchange.
423 */ 423 */
424 if (s->s3->tmp.use_rsa_tmp || 424 if (s->s3->tmp.use_rsa_tmp ||
425 (alg_k & (SSL_kDHr|SSL_kDHd|SSL_kEDH)) || 425 (alg_k & (SSL_kDHr|SSL_kDHd|SSL_kDHE)) ||
426 (alg_k & SSL_kEECDH) || 426 (alg_k & SSL_kECDHE) ||
427 ((alg_k & SSL_kRSA) && 427 ((alg_k & SSL_kRSA) &&
428 (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == 428 (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey ==
429 NULL))) { 429 NULL))) {
@@ -1416,7 +1416,7 @@ ssl3_send_server_key_exchange(SSL *s)
1416 r[1] = rsa->e; 1416 r[1] = rsa->e;
1417 s->s3->tmp.use_rsa_tmp = 1; 1417 s->s3->tmp.use_rsa_tmp = 1;
1418 } else 1418 } else
1419 if (type & SSL_kEDH) { 1419 if (type & SSL_kDHE) {
1420 dhp = cert->dh_tmp; 1420 dhp = cert->dh_tmp;
1421 if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL)) 1421 if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL))
1422 dhp = s->cert->dh_tmp_cb(s, 0, 0); 1422 dhp = s->cert->dh_tmp_cb(s, 0, 0);
@@ -1463,7 +1463,7 @@ ssl3_send_server_key_exchange(SSL *s)
1463 r[1] = dh->g; 1463 r[1] = dh->g;
1464 r[2] = dh->pub_key; 1464 r[2] = dh->pub_key;
1465 } else 1465 } else
1466 if (type & SSL_kEECDH) { 1466 if (type & SSL_kECDHE) {
1467 const EC_GROUP *group; 1467 const EC_GROUP *group;
1468 1468
1469 ecdhp = cert->ecdh_tmp; 1469 ecdhp = cert->ecdh_tmp;
@@ -1614,7 +1614,7 @@ ssl3_send_server_key_exchange(SSL *s)
1614 p += nr[i]; 1614 p += nr[i];
1615 } 1615 }
1616 1616
1617 if (type & SSL_kEECDH) { 1617 if (type & SSL_kECDHE) {
1618 /* 1618 /*
1619 * XXX: For now, we only support named (not generic) 1619 * XXX: For now, we only support named (not generic)
1620 * curves. 1620 * curves.
@@ -1968,7 +1968,7 @@ ssl3_get_client_key_exchange(SSL *s)
1968 p, i); 1968 p, i);
1969 OPENSSL_cleanse(p, i); 1969 OPENSSL_cleanse(p, i);
1970 } else 1970 } else
1971 if (alg_k & (SSL_kEDH|SSL_kDHr|SSL_kDHd)) { 1971 if (alg_k & (SSL_kDHE|SSL_kDHr|SSL_kDHd)) {
1972 if (2 > n) 1972 if (2 > n)
1973 goto truncated; 1973 goto truncated;
1974 n2s(p, i); 1974 n2s(p, i);
@@ -2026,7 +2026,7 @@ ssl3_get_client_key_exchange(SSL *s)
2026 OPENSSL_cleanse(p, i); 2026 OPENSSL_cleanse(p, i);
2027 } else 2027 } else
2028 2028
2029 if (alg_k & (SSL_kEECDH|SSL_kECDHr|SSL_kECDHe)) { 2029 if (alg_k & (SSL_kECDHE|SSL_kECDHr|SSL_kECDHe)) {
2030 int ret = 1; 2030 int ret = 1;
2031 int field_size = 0; 2031 int field_size = 0;
2032 const EC_KEY *tkey; 2032 const EC_KEY *tkey;
@@ -2072,7 +2072,7 @@ ssl3_get_client_key_exchange(SSL *s)
2072 if (n == 0L) { 2072 if (n == 0L) {
2073 /* Client Publickey was in Client Certificate */ 2073 /* Client Publickey was in Client Certificate */
2074 2074
2075 if (alg_k & SSL_kEECDH) { 2075 if (alg_k & SSL_kECDHE) {
2076 al = SSL_AD_HANDSHAKE_FAILURE; 2076 al = SSL_AD_HANDSHAKE_FAILURE;
2077 SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE, 2077 SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,
2078 SSL_R_MISSING_TMP_ECDH_KEY); 2078 SSL_R_MISSING_TMP_ECDH_KEY);