summaryrefslogtreecommitdiff
path: root/src/lib/libssl/tls13_client.c
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--src/lib/libssl/tls13_client.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/src/lib/libssl/tls13_client.c b/src/lib/libssl/tls13_client.c
index 4dfb02581a..8ba78cd02b 100644
--- a/src/lib/libssl/tls13_client.c
+++ b/src/lib/libssl/tls13_client.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls13_client.c,v 1.88 2021/10/25 10:01:46 jsing Exp $ */ 1/* $OpenBSD: tls13_client.c,v 1.89 2022/01/05 17:10:02 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org>
4 * 4 *
@@ -51,9 +51,9 @@ tls13_client_init(struct tls13_ctx *ctx)
51 tls1_get_group_list(s, 0, &groups, &groups_len); 51 tls1_get_group_list(s, 0, &groups, &groups_len);
52 if (groups_len < 1) 52 if (groups_len < 1)
53 return 0; 53 return 0;
54 if ((ctx->hs->tls13.key_share = tls13_key_share_new(groups[0])) == NULL) 54 if ((ctx->hs->key_share = tls_key_share_new(groups[0])) == NULL)
55 return 0; 55 return 0;
56 if (!tls13_key_share_generate(ctx->hs->tls13.key_share)) 56 if (!tls_key_share_generate(ctx->hs->key_share))
57 return 0; 57 return 0;
58 58
59 arc4random_buf(s->s3->client_random, SSL3_RANDOM_SIZE); 59 arc4random_buf(s->s3->client_random, SSL3_RANDOM_SIZE);
@@ -343,7 +343,7 @@ tls13_client_engage_record_protection(struct tls13_ctx *ctx)
343 343
344 /* Derive the shared key and engage record protection. */ 344 /* Derive the shared key and engage record protection. */
345 345
346 if (!tls13_key_share_derive(ctx->hs->tls13.key_share, &shared_key, 346 if (!tls_key_share_derive(ctx->hs->key_share, &shared_key,
347 &shared_key_len)) 347 &shared_key_len))
348 goto err; 348 goto err;
349 349
@@ -442,15 +442,15 @@ tls13_client_hello_retry_send(struct tls13_ctx *ctx, CBB *cbb)
442 */ 442 */
443 if (!tls1_check_curve(ctx->ssl, ctx->hs->tls13.server_group)) 443 if (!tls1_check_curve(ctx->ssl, ctx->hs->tls13.server_group))
444 return 0; /* XXX alert */ 444 return 0; /* XXX alert */
445 if (ctx->hs->tls13.server_group == tls13_key_share_group(ctx->hs->tls13.key_share)) 445 if (ctx->hs->tls13.server_group == tls_key_share_group(ctx->hs->key_share))
446 return 0; /* XXX alert */ 446 return 0; /* XXX alert */
447 447
448 /* Switch to new key share. */ 448 /* Switch to new key share. */
449 tls13_key_share_free(ctx->hs->tls13.key_share); 449 tls_key_share_free(ctx->hs->key_share);
450 if ((ctx->hs->tls13.key_share = 450 if ((ctx->hs->key_share =
451 tls13_key_share_new(ctx->hs->tls13.server_group)) == NULL) 451 tls_key_share_new(ctx->hs->tls13.server_group)) == NULL)
452 return 0; 452 return 0;
453 if (!tls13_key_share_generate(ctx->hs->tls13.key_share)) 453 if (!tls_key_share_generate(ctx->hs->key_share))
454 return 0; 454 return 0;
455 455
456 if (!tls13_client_hello_build(ctx, cbb)) 456 if (!tls13_client_hello_build(ctx, cbb))