summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_clnt.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/ssl_clnt.c')
-rw-r--r--src/lib/libssl/ssl_clnt.c24
1 files changed, 12 insertions, 12 deletions
diff --git a/src/lib/libssl/ssl_clnt.c b/src/lib/libssl/ssl_clnt.c
index e7c78b139b..f7bbca0d78 100644
--- a/src/lib/libssl/ssl_clnt.c
+++ b/src/lib/libssl/ssl_clnt.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_clnt.c,v 1.1 2017/01/26 05:51:54 jsing Exp $ */ 1/* $OpenBSD: ssl_clnt.c,v 1.2 2017/01/26 06:32:58 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -419,12 +419,12 @@ ssl3_connect(SSL *s)
419 s->internal->init_num = 0; 419 s->internal->init_num = 0;
420 420
421 s->session->cipher = S3I(s)->tmp.new_cipher; 421 s->session->cipher = S3I(s)->tmp.new_cipher;
422 if (!s->method->internal->ssl3_enc->setup_key_block(s)) { 422 if (!tls1_setup_key_block(s)) {
423 ret = -1; 423 ret = -1;
424 goto end; 424 goto end;
425 } 425 }
426 426
427 if (!s->method->internal->ssl3_enc->change_cipher_state(s, 427 if (!tls1_change_cipher_state(s,
428 SSL3_CHANGE_CIPHER_CLIENT_WRITE)) { 428 SSL3_CHANGE_CIPHER_CLIENT_WRITE)) {
429 ret = -1; 429 ret = -1;
430 goto end; 430 goto end;
@@ -444,8 +444,8 @@ ssl3_connect(SSL *s)
444 case SSL3_ST_CW_FINISHED_B: 444 case SSL3_ST_CW_FINISHED_B:
445 ret = ssl3_send_finished(s, SSL3_ST_CW_FINISHED_A, 445 ret = ssl3_send_finished(s, SSL3_ST_CW_FINISHED_A,
446 SSL3_ST_CW_FINISHED_B, 446 SSL3_ST_CW_FINISHED_B,
447 s->method->internal->ssl3_enc->client_finished_label, 447 TLS_MD_CLIENT_FINISH_CONST,
448 s->method->internal->ssl3_enc->client_finished_label_len); 448 TLS_MD_CLIENT_FINISH_CONST_SIZE);
449 if (ret <= 0) 449 if (ret <= 0)
450 goto end; 450 goto end;
451 s->s3->flags |= SSL3_FLAGS_CCS_OK; 451 s->s3->flags |= SSL3_FLAGS_CCS_OK;
@@ -2005,7 +2005,7 @@ ssl3_send_client_kex_rsa(SSL *s, SESS_CERT *sess_cert, CBB *cbb)
2005 goto err; 2005 goto err;
2006 2006
2007 s->session->master_key_length = 2007 s->session->master_key_length =
2008 s->method->internal->ssl3_enc->generate_master_secret(s, 2008 tls1_generate_master_secret(s,
2009 s->session->master_key, pms, sizeof(pms)); 2009 s->session->master_key, pms, sizeof(pms));
2010 2010
2011 ret = 1; 2011 ret = 1;
@@ -2060,7 +2060,7 @@ ssl3_send_client_kex_dhe(SSL *s, SESS_CERT *sess_cert, CBB *cbb)
2060 2060
2061 /* Generate master key from the result. */ 2061 /* Generate master key from the result. */
2062 s->session->master_key_length = 2062 s->session->master_key_length =
2063 s->method->internal->ssl3_enc->generate_master_secret(s, 2063 tls1_generate_master_secret(s,
2064 s->session->master_key, key, key_len); 2064 s->session->master_key, key, key_len);
2065 2065
2066 if (!CBB_add_u16_length_prefixed(cbb, &dh_Yc)) 2066 if (!CBB_add_u16_length_prefixed(cbb, &dh_Yc))
@@ -2135,7 +2135,7 @@ ssl3_send_client_kex_ecdhe_ecp(SSL *s, SESS_CERT *sc, CBB *cbb)
2135 2135
2136 /* Generate master key from the result. */ 2136 /* Generate master key from the result. */
2137 s->session->master_key_length = 2137 s->session->master_key_length =
2138 s->method->internal->ssl3_enc->generate_master_secret(s, 2138 tls1_generate_master_secret(s,
2139 s->session->master_key, key, key_len); 2139 s->session->master_key, key, key_len);
2140 2140
2141 encoded_len = EC_POINT_point2oct(group, EC_KEY_get0_public_key(ecdh), 2141 encoded_len = EC_POINT_point2oct(group, EC_KEY_get0_public_key(ecdh),
@@ -2204,7 +2204,7 @@ ssl3_send_client_kex_ecdhe_ecx(SSL *s, SESS_CERT *sc, CBB *cbb)
2204 2204
2205 /* Generate master key from the result. */ 2205 /* Generate master key from the result. */
2206 s->session->master_key_length = 2206 s->session->master_key_length =
2207 s->method->internal->ssl3_enc->generate_master_secret(s, 2207 tls1_generate_master_secret(s,
2208 s->session->master_key, shared_key, X25519_KEY_LENGTH); 2208 s->session->master_key, shared_key, X25519_KEY_LENGTH);
2209 2209
2210 ret = 1; 2210 ret = 1;
@@ -2344,7 +2344,7 @@ ssl3_send_client_kex_gost(SSL *s, SESS_CERT *sess_cert, CBB *cbb)
2344 } 2344 }
2345 EVP_PKEY_CTX_free(pkey_ctx); 2345 EVP_PKEY_CTX_free(pkey_ctx);
2346 s->session->master_key_length = 2346 s->session->master_key_length =
2347 s->method->internal->ssl3_enc->generate_master_secret(s, 2347 tls1_generate_master_secret(s,
2348 s->session->master_key, premaster_secret, 32); 2348 s->session->master_key, premaster_secret, 32);
2349 2349
2350 ret = 1; 2350 ret = 1;
@@ -2441,7 +2441,7 @@ ssl3_send_client_verify(SSL *s)
2441 EVP_PKEY_sign_init(pctx); 2441 EVP_PKEY_sign_init(pctx);
2442 if (EVP_PKEY_CTX_set_signature_md(pctx, EVP_sha1()) > 0) { 2442 if (EVP_PKEY_CTX_set_signature_md(pctx, EVP_sha1()) > 0) {
2443 if (!SSL_USE_SIGALGS(s)) 2443 if (!SSL_USE_SIGALGS(s))
2444 s->method->internal->ssl3_enc->cert_verify_mac(s, 2444 tls1_cert_verify_mac(s,
2445 NID_sha1, &(data[MD5_DIGEST_LENGTH])); 2445 NID_sha1, &(data[MD5_DIGEST_LENGTH]));
2446 } else { 2446 } else {
2447 ERR_clear_error(); 2447 ERR_clear_error();
@@ -2475,7 +2475,7 @@ ssl3_send_client_verify(SSL *s)
2475 if (!tls1_digest_cached_records(s)) 2475 if (!tls1_digest_cached_records(s))
2476 goto err; 2476 goto err;
2477 } else if (pkey->type == EVP_PKEY_RSA) { 2477 } else if (pkey->type == EVP_PKEY_RSA) {
2478 s->method->internal->ssl3_enc->cert_verify_mac( 2478 tls1_cert_verify_mac(
2479 s, NID_md5, &(data[0])); 2479 s, NID_md5, &(data[0]));
2480 if (RSA_sign(NID_md5_sha1, data, 2480 if (RSA_sign(NID_md5_sha1, data,
2481 MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH, &(p[2]), 2481 MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH, &(p[2]),