diff options
Diffstat (limited to 'src/lib/libssl/ssl_clnt.c')
-rw-r--r-- | src/lib/libssl/ssl_clnt.c | 24 |
1 files changed, 12 insertions, 12 deletions
diff --git a/src/lib/libssl/ssl_clnt.c b/src/lib/libssl/ssl_clnt.c index e7c78b139b..f7bbca0d78 100644 --- a/src/lib/libssl/ssl_clnt.c +++ b/src/lib/libssl/ssl_clnt.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_clnt.c,v 1.1 2017/01/26 05:51:54 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_clnt.c,v 1.2 2017/01/26 06:32:58 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -419,12 +419,12 @@ ssl3_connect(SSL *s) | |||
419 | s->internal->init_num = 0; | 419 | s->internal->init_num = 0; |
420 | 420 | ||
421 | s->session->cipher = S3I(s)->tmp.new_cipher; | 421 | s->session->cipher = S3I(s)->tmp.new_cipher; |
422 | if (!s->method->internal->ssl3_enc->setup_key_block(s)) { | 422 | if (!tls1_setup_key_block(s)) { |
423 | ret = -1; | 423 | ret = -1; |
424 | goto end; | 424 | goto end; |
425 | } | 425 | } |
426 | 426 | ||
427 | if (!s->method->internal->ssl3_enc->change_cipher_state(s, | 427 | if (!tls1_change_cipher_state(s, |
428 | SSL3_CHANGE_CIPHER_CLIENT_WRITE)) { | 428 | SSL3_CHANGE_CIPHER_CLIENT_WRITE)) { |
429 | ret = -1; | 429 | ret = -1; |
430 | goto end; | 430 | goto end; |
@@ -444,8 +444,8 @@ ssl3_connect(SSL *s) | |||
444 | case SSL3_ST_CW_FINISHED_B: | 444 | case SSL3_ST_CW_FINISHED_B: |
445 | ret = ssl3_send_finished(s, SSL3_ST_CW_FINISHED_A, | 445 | ret = ssl3_send_finished(s, SSL3_ST_CW_FINISHED_A, |
446 | SSL3_ST_CW_FINISHED_B, | 446 | SSL3_ST_CW_FINISHED_B, |
447 | s->method->internal->ssl3_enc->client_finished_label, | 447 | TLS_MD_CLIENT_FINISH_CONST, |
448 | s->method->internal->ssl3_enc->client_finished_label_len); | 448 | TLS_MD_CLIENT_FINISH_CONST_SIZE); |
449 | if (ret <= 0) | 449 | if (ret <= 0) |
450 | goto end; | 450 | goto end; |
451 | s->s3->flags |= SSL3_FLAGS_CCS_OK; | 451 | s->s3->flags |= SSL3_FLAGS_CCS_OK; |
@@ -2005,7 +2005,7 @@ ssl3_send_client_kex_rsa(SSL *s, SESS_CERT *sess_cert, CBB *cbb) | |||
2005 | goto err; | 2005 | goto err; |
2006 | 2006 | ||
2007 | s->session->master_key_length = | 2007 | s->session->master_key_length = |
2008 | s->method->internal->ssl3_enc->generate_master_secret(s, | 2008 | tls1_generate_master_secret(s, |
2009 | s->session->master_key, pms, sizeof(pms)); | 2009 | s->session->master_key, pms, sizeof(pms)); |
2010 | 2010 | ||
2011 | ret = 1; | 2011 | ret = 1; |
@@ -2060,7 +2060,7 @@ ssl3_send_client_kex_dhe(SSL *s, SESS_CERT *sess_cert, CBB *cbb) | |||
2060 | 2060 | ||
2061 | /* Generate master key from the result. */ | 2061 | /* Generate master key from the result. */ |
2062 | s->session->master_key_length = | 2062 | s->session->master_key_length = |
2063 | s->method->internal->ssl3_enc->generate_master_secret(s, | 2063 | tls1_generate_master_secret(s, |
2064 | s->session->master_key, key, key_len); | 2064 | s->session->master_key, key, key_len); |
2065 | 2065 | ||
2066 | if (!CBB_add_u16_length_prefixed(cbb, &dh_Yc)) | 2066 | if (!CBB_add_u16_length_prefixed(cbb, &dh_Yc)) |
@@ -2135,7 +2135,7 @@ ssl3_send_client_kex_ecdhe_ecp(SSL *s, SESS_CERT *sc, CBB *cbb) | |||
2135 | 2135 | ||
2136 | /* Generate master key from the result. */ | 2136 | /* Generate master key from the result. */ |
2137 | s->session->master_key_length = | 2137 | s->session->master_key_length = |
2138 | s->method->internal->ssl3_enc->generate_master_secret(s, | 2138 | tls1_generate_master_secret(s, |
2139 | s->session->master_key, key, key_len); | 2139 | s->session->master_key, key, key_len); |
2140 | 2140 | ||
2141 | encoded_len = EC_POINT_point2oct(group, EC_KEY_get0_public_key(ecdh), | 2141 | encoded_len = EC_POINT_point2oct(group, EC_KEY_get0_public_key(ecdh), |
@@ -2204,7 +2204,7 @@ ssl3_send_client_kex_ecdhe_ecx(SSL *s, SESS_CERT *sc, CBB *cbb) | |||
2204 | 2204 | ||
2205 | /* Generate master key from the result. */ | 2205 | /* Generate master key from the result. */ |
2206 | s->session->master_key_length = | 2206 | s->session->master_key_length = |
2207 | s->method->internal->ssl3_enc->generate_master_secret(s, | 2207 | tls1_generate_master_secret(s, |
2208 | s->session->master_key, shared_key, X25519_KEY_LENGTH); | 2208 | s->session->master_key, shared_key, X25519_KEY_LENGTH); |
2209 | 2209 | ||
2210 | ret = 1; | 2210 | ret = 1; |
@@ -2344,7 +2344,7 @@ ssl3_send_client_kex_gost(SSL *s, SESS_CERT *sess_cert, CBB *cbb) | |||
2344 | } | 2344 | } |
2345 | EVP_PKEY_CTX_free(pkey_ctx); | 2345 | EVP_PKEY_CTX_free(pkey_ctx); |
2346 | s->session->master_key_length = | 2346 | s->session->master_key_length = |
2347 | s->method->internal->ssl3_enc->generate_master_secret(s, | 2347 | tls1_generate_master_secret(s, |
2348 | s->session->master_key, premaster_secret, 32); | 2348 | s->session->master_key, premaster_secret, 32); |
2349 | 2349 | ||
2350 | ret = 1; | 2350 | ret = 1; |
@@ -2441,7 +2441,7 @@ ssl3_send_client_verify(SSL *s) | |||
2441 | EVP_PKEY_sign_init(pctx); | 2441 | EVP_PKEY_sign_init(pctx); |
2442 | if (EVP_PKEY_CTX_set_signature_md(pctx, EVP_sha1()) > 0) { | 2442 | if (EVP_PKEY_CTX_set_signature_md(pctx, EVP_sha1()) > 0) { |
2443 | if (!SSL_USE_SIGALGS(s)) | 2443 | if (!SSL_USE_SIGALGS(s)) |
2444 | s->method->internal->ssl3_enc->cert_verify_mac(s, | 2444 | tls1_cert_verify_mac(s, |
2445 | NID_sha1, &(data[MD5_DIGEST_LENGTH])); | 2445 | NID_sha1, &(data[MD5_DIGEST_LENGTH])); |
2446 | } else { | 2446 | } else { |
2447 | ERR_clear_error(); | 2447 | ERR_clear_error(); |
@@ -2475,7 +2475,7 @@ ssl3_send_client_verify(SSL *s) | |||
2475 | if (!tls1_digest_cached_records(s)) | 2475 | if (!tls1_digest_cached_records(s)) |
2476 | goto err; | 2476 | goto err; |
2477 | } else if (pkey->type == EVP_PKEY_RSA) { | 2477 | } else if (pkey->type == EVP_PKEY_RSA) { |
2478 | s->method->internal->ssl3_enc->cert_verify_mac( | 2478 | tls1_cert_verify_mac( |
2479 | s, NID_md5, &(data[0])); | 2479 | s, NID_md5, &(data[0])); |
2480 | if (RSA_sign(NID_md5_sha1, data, | 2480 | if (RSA_sign(NID_md5_sha1, data, |
2481 | MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH, &(p[2]), | 2481 | MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH, &(p[2]), |