diff options
Diffstat (limited to '')
-rw-r--r-- | src/lib/libssl/tls13_client.c | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/src/lib/libssl/tls13_client.c b/src/lib/libssl/tls13_client.c index 4dfb02581a..8ba78cd02b 100644 --- a/src/lib/libssl/tls13_client.c +++ b/src/lib/libssl/tls13_client.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: tls13_client.c,v 1.88 2021/10/25 10:01:46 jsing Exp $ */ | 1 | /* $OpenBSD: tls13_client.c,v 1.89 2022/01/05 17:10:02 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -51,9 +51,9 @@ tls13_client_init(struct tls13_ctx *ctx) | |||
51 | tls1_get_group_list(s, 0, &groups, &groups_len); | 51 | tls1_get_group_list(s, 0, &groups, &groups_len); |
52 | if (groups_len < 1) | 52 | if (groups_len < 1) |
53 | return 0; | 53 | return 0; |
54 | if ((ctx->hs->tls13.key_share = tls13_key_share_new(groups[0])) == NULL) | 54 | if ((ctx->hs->key_share = tls_key_share_new(groups[0])) == NULL) |
55 | return 0; | 55 | return 0; |
56 | if (!tls13_key_share_generate(ctx->hs->tls13.key_share)) | 56 | if (!tls_key_share_generate(ctx->hs->key_share)) |
57 | return 0; | 57 | return 0; |
58 | 58 | ||
59 | arc4random_buf(s->s3->client_random, SSL3_RANDOM_SIZE); | 59 | arc4random_buf(s->s3->client_random, SSL3_RANDOM_SIZE); |
@@ -343,7 +343,7 @@ tls13_client_engage_record_protection(struct tls13_ctx *ctx) | |||
343 | 343 | ||
344 | /* Derive the shared key and engage record protection. */ | 344 | /* Derive the shared key and engage record protection. */ |
345 | 345 | ||
346 | if (!tls13_key_share_derive(ctx->hs->tls13.key_share, &shared_key, | 346 | if (!tls_key_share_derive(ctx->hs->key_share, &shared_key, |
347 | &shared_key_len)) | 347 | &shared_key_len)) |
348 | goto err; | 348 | goto err; |
349 | 349 | ||
@@ -442,15 +442,15 @@ tls13_client_hello_retry_send(struct tls13_ctx *ctx, CBB *cbb) | |||
442 | */ | 442 | */ |
443 | if (!tls1_check_curve(ctx->ssl, ctx->hs->tls13.server_group)) | 443 | if (!tls1_check_curve(ctx->ssl, ctx->hs->tls13.server_group)) |
444 | return 0; /* XXX alert */ | 444 | return 0; /* XXX alert */ |
445 | if (ctx->hs->tls13.server_group == tls13_key_share_group(ctx->hs->tls13.key_share)) | 445 | if (ctx->hs->tls13.server_group == tls_key_share_group(ctx->hs->key_share)) |
446 | return 0; /* XXX alert */ | 446 | return 0; /* XXX alert */ |
447 | 447 | ||
448 | /* Switch to new key share. */ | 448 | /* Switch to new key share. */ |
449 | tls13_key_share_free(ctx->hs->tls13.key_share); | 449 | tls_key_share_free(ctx->hs->key_share); |
450 | if ((ctx->hs->tls13.key_share = | 450 | if ((ctx->hs->key_share = |
451 | tls13_key_share_new(ctx->hs->tls13.server_group)) == NULL) | 451 | tls_key_share_new(ctx->hs->tls13.server_group)) == NULL) |
452 | return 0; | 452 | return 0; |
453 | if (!tls13_key_share_generate(ctx->hs->tls13.key_share)) | 453 | if (!tls_key_share_generate(ctx->hs->key_share)) |
454 | return 0; | 454 | return 0; |
455 | 455 | ||
456 | if (!tls13_client_hello_build(ctx, cbb)) | 456 | if (!tls13_client_hello_build(ctx, cbb)) |