summaryrefslogtreecommitdiff
path: root/src/lib/libssl/t1_lib.c
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--src/lib/libssl/t1_lib.c58
1 files changed, 29 insertions, 29 deletions
diff --git a/src/lib/libssl/t1_lib.c b/src/lib/libssl/t1_lib.c
index b06004e88a..758f7b1e11 100644
--- a/src/lib/libssl/t1_lib.c
+++ b/src/lib/libssl/t1_lib.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: t1_lib.c,v 1.146 2018/11/05 06:55:37 jsing Exp $ */ 1/* $OpenBSD: t1_lib.c,v 1.147 2018/11/05 20:41:30 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -361,25 +361,25 @@ tls1_get_formatlist(SSL *s, int client_formats, const uint8_t **pformats,
361} 361}
362 362
363/* 363/*
364 * Return the appropriate curve list. If client_curves is non-zero, return 364 * Return the appropriate group list. If client_groups is non-zero, return
365 * the client/session curves. Otherwise return the custom curve list if one 365 * the client/session groups. Otherwise return the custom group list if one
366 * exists, or the default curves if a custom list has not been specified. 366 * exists, or the default groups if a custom list has not been specified.
367 */ 367 */
368void 368void
369tls1_get_curvelist(SSL *s, int client_curves, const uint16_t **pcurves, 369tls1_get_group_list(SSL *s, int client_groups, const uint16_t **pgroups,
370 size_t *pcurveslen) 370 size_t *pgroupslen)
371{ 371{
372 if (client_curves != 0) { 372 if (client_groups != 0) {
373 *pcurves = SSI(s)->tlsext_supportedgroups; 373 *pgroups = SSI(s)->tlsext_supportedgroups;
374 *pcurveslen = SSI(s)->tlsext_supportedgroups_length; 374 *pgroupslen = SSI(s)->tlsext_supportedgroups_length;
375 return; 375 return;
376 } 376 }
377 377
378 *pcurves = s->internal->tlsext_supportedgroups; 378 *pgroups = s->internal->tlsext_supportedgroups;
379 *pcurveslen = s->internal->tlsext_supportedgroups_length; 379 *pgroupslen = s->internal->tlsext_supportedgroups_length;
380 if (*pcurves == NULL) { 380 if (*pgroups == NULL) {
381 *pcurves = eccurves_default; 381 *pgroups = eccurves_default;
382 *pcurveslen = sizeof(eccurves_default) / 2; 382 *pgroupslen = sizeof(eccurves_default) / 2;
383 } 383 }
384} 384}
385 385
@@ -410,7 +410,7 @@ tls1_set_groups(uint16_t **out_group_ids, size_t *out_group_ids_len,
410} 410}
411 411
412int 412int
413tls1_set_groups_list(uint16_t **out_group_ids, size_t *out_group_ids_len, 413tls1_set_group_list(uint16_t **out_group_ids, size_t *out_group_ids_len,
414 const char *groups) 414 const char *groups)
415{ 415{
416 uint16_t *new_group_ids, *group_ids = NULL; 416 uint16_t *new_group_ids, *group_ids = NULL;
@@ -461,13 +461,13 @@ tls1_set_groups_list(uint16_t **out_group_ids, size_t *out_group_ids_len,
461int 461int
462tls1_check_curve(SSL *s, const uint16_t curve_id) 462tls1_check_curve(SSL *s, const uint16_t curve_id)
463{ 463{
464 const uint16_t *curves; 464 const uint16_t *groups;
465 size_t curveslen, i; 465 size_t groupslen, i;
466 466
467 tls1_get_curvelist(s, 0, &curves, &curveslen); 467 tls1_get_group_list(s, 0, &groups, &groupslen);
468 468
469 for (i = 0; i < curveslen; i++) { 469 for (i = 0; i < groupslen; i++) {
470 if (curves[i] == curve_id) 470 if (groups[i] == curve_id)
471 return (1); 471 return (1);
472 } 472 }
473 return (0); 473 return (0);
@@ -486,8 +486,8 @@ tls1_get_shared_curve(SSL *s)
486 486
487 /* Return first preference shared curve. */ 487 /* Return first preference shared curve. */
488 server_pref = (s->internal->options & SSL_OP_CIPHER_SERVER_PREFERENCE); 488 server_pref = (s->internal->options & SSL_OP_CIPHER_SERVER_PREFERENCE);
489 tls1_get_curvelist(s, (server_pref == 0), &pref, &preflen); 489 tls1_get_group_list(s, (server_pref == 0), &pref, &preflen);
490 tls1_get_curvelist(s, (server_pref != 0), &supp, &supplen); 490 tls1_get_group_list(s, (server_pref != 0), &supp, &supplen);
491 491
492 for (i = 0; i < preflen; i++) { 492 for (i = 0; i < preflen; i++) {
493 for (j = 0; j < supplen; j++) { 493 for (j = 0; j < supplen; j++) {
@@ -548,8 +548,8 @@ tls1_set_ec_id(uint16_t *curve_id, uint8_t *comp_id, EC_KEY *ec)
548static int 548static int
549tls1_check_ec_key(SSL *s, const uint16_t *curve_id, const uint8_t *comp_id) 549tls1_check_ec_key(SSL *s, const uint16_t *curve_id, const uint8_t *comp_id)
550{ 550{
551 size_t curveslen, formatslen, i; 551 size_t groupslen, formatslen, i;
552 const uint16_t *curves; 552 const uint16_t *groups;
553 const uint8_t *formats; 553 const uint8_t *formats;
554 554
555 /* 555 /*
@@ -569,13 +569,13 @@ tls1_check_ec_key(SSL *s, const uint16_t *curve_id, const uint8_t *comp_id)
569 /* 569 /*
570 * Check curve list if present, otherwise everything is supported. 570 * Check curve list if present, otherwise everything is supported.
571 */ 571 */
572 tls1_get_curvelist(s, 1, &curves, &curveslen); 572 tls1_get_group_list(s, 1, &groups, &groupslen);
573 if (curve_id != NULL && curves != NULL) { 573 if (curve_id != NULL && groups != NULL) {
574 for (i = 0; i < curveslen; i++) { 574 for (i = 0; i < groupslen; i++) {
575 if (curves[i] == *curve_id) 575 if (groups[i] == *curve_id)
576 break; 576 break;
577 } 577 }
578 if (i == curveslen) 578 if (i == groupslen)
579 return (0); 579 return (0);
580 } 580 }
581 581