summaryrefslogtreecommitdiff
path: root/src/lib/libssl/tls13_server.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/tls13_server.c')
-rw-r--r--src/lib/libssl/tls13_server.c22
1 files changed, 11 insertions, 11 deletions
diff --git a/src/lib/libssl/tls13_server.c b/src/lib/libssl/tls13_server.c
index 0b040fb51d..9dfb4a7227 100644
--- a/src/lib/libssl/tls13_server.c
+++ b/src/lib/libssl/tls13_server.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls13_server.c,v 1.40 2020/05/09 20:38:19 tb Exp $ */ 1/* $OpenBSD: tls13_server.c,v 1.41 2020/05/10 16:56:11 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2019, 2020 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2019, 2020 Joel Sing <jsing@openbsd.org>
4 * Copyright (c) 2020 Bob Beck <beck@openbsd.org> 4 * Copyright (c) 2020 Bob Beck <beck@openbsd.org>
@@ -129,13 +129,13 @@ tls13_client_hello_process(struct tls13_ctx *ctx, CBS *cbs)
129 * TLS 1.3 or later. This requires the legacy version be set to 0x0303. 129 * TLS 1.3 or later. This requires the legacy version be set to 0x0303.
130 */ 130 */
131 if (legacy_version != TLS1_2_VERSION) { 131 if (legacy_version != TLS1_2_VERSION) {
132 ctx->alert = SSL_AD_PROTOCOL_VERSION; 132 ctx->alert = TLS13_ALERT_PROTOCOL_VERSION;
133 goto err; 133 goto err;
134 } 134 }
135 135
136 /* Store legacy session identifier so we can echo it. */ 136 /* Store legacy session identifier so we can echo it. */
137 if (CBS_len(&session_id) > sizeof(ctx->hs->legacy_session_id)) { 137 if (CBS_len(&session_id) > sizeof(ctx->hs->legacy_session_id)) {
138 ctx->alert = SSL_AD_ILLEGAL_PARAMETER; 138 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER;
139 goto err; 139 goto err;
140 } 140 }
141 if (!CBS_write_bytes(&session_id, ctx->hs->legacy_session_id, 141 if (!CBS_write_bytes(&session_id, ctx->hs->legacy_session_id,
@@ -144,14 +144,14 @@ tls13_client_hello_process(struct tls13_ctx *ctx, CBS *cbs)
144 144
145 /* Parse cipher suites list and select preferred cipher. */ 145 /* Parse cipher suites list and select preferred cipher. */
146 if ((ciphers = ssl_bytes_to_cipher_list(s, &cipher_suites)) == NULL) { 146 if ((ciphers = ssl_bytes_to_cipher_list(s, &cipher_suites)) == NULL) {
147 ctx->alert = SSL_AD_ILLEGAL_PARAMETER; 147 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER;
148 goto err; 148 goto err;
149 } 149 }
150 cipher = ssl3_choose_cipher(s, ciphers, SSL_get_ciphers(s)); 150 cipher = ssl3_choose_cipher(s, ciphers, SSL_get_ciphers(s));
151 if (cipher == NULL) { 151 if (cipher == NULL) {
152 tls13_set_errorx(ctx, TLS13_ERR_NO_SHARED_CIPHER, 0, 152 tls13_set_errorx(ctx, TLS13_ERR_NO_SHARED_CIPHER, 0,
153 "no shared cipher found", NULL); 153 "no shared cipher found", NULL);
154 ctx->alert = SSL_AD_HANDSHAKE_FAILURE; 154 ctx->alert = TLS13_ALERT_HANDSHAKE_FAILURE;
155 goto err; 155 goto err;
156 } 156 }
157 S3I(s)->hs.new_cipher = cipher; 157 S3I(s)->hs.new_cipher = cipher;
@@ -159,7 +159,7 @@ tls13_client_hello_process(struct tls13_ctx *ctx, CBS *cbs)
159 /* Ensure only the NULL compression method is advertised. */ 159 /* Ensure only the NULL compression method is advertised. */
160 if (!CBS_mem_equal(&compression_methods, tls13_compression_null_only, 160 if (!CBS_mem_equal(&compression_methods, tls13_compression_null_only,
161 sizeof(tls13_compression_null_only))) { 161 sizeof(tls13_compression_null_only))) {
162 ctx->alert = SSL_AD_ILLEGAL_PARAMETER; 162 ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER;
163 goto err; 163 goto err;
164 } 164 }
165 165
@@ -517,7 +517,7 @@ tls13_server_certificate_verify_send(struct tls13_ctx *ctx, CBB *cbb)
517 517
518 err: 518 err:
519 if (!ret && ctx->alert == 0) 519 if (!ret && ctx->alert == 0)
520 ctx->alert = TLS1_AD_INTERNAL_ERROR; 520 ctx->alert = TLS13_ALERT_INTERNAL_ERROR;
521 521
522 CBB_cleanup(&sig_cbb); 522 CBB_cleanup(&sig_cbb);
523 EVP_MD_CTX_free(mdctx); 523 EVP_MD_CTX_free(mdctx);
@@ -757,12 +757,12 @@ tls13_client_certificate_verify_recv(struct tls13_ctx *ctx, CBS *cbs)
757 goto err; 757 goto err;
758 } 758 }
759 if (!EVP_DigestVerifyUpdate(mdctx, sig_content, sig_content_len)) { 759 if (!EVP_DigestVerifyUpdate(mdctx, sig_content, sig_content_len)) {
760 ctx->alert = TLS1_AD_DECRYPT_ERROR; 760 ctx->alert = TLS13_ALERT_DECRYPT_ERROR;
761 goto err; 761 goto err;
762 } 762 }
763 if (EVP_DigestVerifyFinal(mdctx, CBS_data(&signature), 763 if (EVP_DigestVerifyFinal(mdctx, CBS_data(&signature),
764 CBS_len(&signature)) <= 0) { 764 CBS_len(&signature)) <= 0) {
765 ctx->alert = TLS1_AD_DECRYPT_ERROR; 765 ctx->alert = TLS13_ALERT_DECRYPT_ERROR;
766 goto err; 766 goto err;
767 } 767 }
768 768
@@ -770,7 +770,7 @@ tls13_client_certificate_verify_recv(struct tls13_ctx *ctx, CBS *cbs)
770 770
771 err: 771 err:
772 if (!ret && ctx->alert == 0) { 772 if (!ret && ctx->alert == 0) {
773 ctx->alert = TLS1_AD_DECODE_ERROR; 773 ctx->alert = TLS13_ALERT_DECODE_ERROR;
774 } 774 }
775 CBB_cleanup(&cbb); 775 CBB_cleanup(&cbb);
776 EVP_MD_CTX_free(mdctx); 776 EVP_MD_CTX_free(mdctx);
@@ -826,7 +826,7 @@ tls13_client_finished_recv(struct tls13_ctx *ctx, CBS *cbs)
826 goto err; 826 goto err;
827 827
828 if (!CBS_mem_equal(cbs, verify_data, verify_data_len)) { 828 if (!CBS_mem_equal(cbs, verify_data, verify_data_len)) {
829 ctx->alert = TLS1_AD_DECRYPT_ERROR; 829 ctx->alert = TLS13_ALERT_DECRYPT_ERROR;
830 goto err; 830 goto err;
831 } 831 }
832 832