From 6535bd837c4df935c9b8881180e8dd93a83530dc Mon Sep 17 00:00:00 2001 From: jsing <> Date: Sat, 9 Feb 2019 15:26:15 +0000 Subject: Rename tls1_handshake_hash*() to tls1_transcript_hash*(). While handshake hash is correct (in as far as it is a hash of handshake messages), using tls1_transcript_hash*() aligns them with the naming of the tls1_transcript*() functions. Additionally, the TLSv1.3 specification uses Transcript-Hash and "transcript hash", which this matches. ok inoguchi@ tb@ --- src/lib/libssl/ssl_srvr.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'src/lib/libssl/ssl_srvr.c') diff --git a/src/lib/libssl/ssl_srvr.c b/src/lib/libssl/ssl_srvr.c index afc7c94de8..6872fa3523 100644 --- a/src/lib/libssl/ssl_srvr.c +++ b/src/lib/libssl/ssl_srvr.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ssl_srvr.c,v 1.63 2019/01/18 00:54:42 jsing Exp $ */ +/* $OpenBSD: ssl_srvr.c,v 1.64 2019/02/09 15:26:15 jsing Exp $ */ /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * @@ -575,7 +575,7 @@ ssl3_accept(SSL *s) * We need to get hashes here so if there is * a client cert, it can be verified. */ - if (!tls1_handshake_hash_value(s, + if (!tls1_transcript_hash_value(s, S3I(s)->tmp.cert_verify_md, sizeof(S3I(s)->tmp.cert_verify_md), NULL)) { @@ -1104,7 +1104,7 @@ ssl3_get_client_hello(SSL *s) S3I(s)->hs.new_cipher = s->session->cipher; } - if (!tls1_handshake_hash_init(s)) + if (!tls1_transcript_hash_init(s)) goto err; alg_k = S3I(s)->hs.new_cipher->algorithm_mkey; -- cgit v1.2.3-55-g6feb