diff options
author | thegeorg <thegeorg@yandex-team.ru> | 2022-05-10 22:16:03 +0300 |
---|---|---|
committer | thegeorg <thegeorg@yandex-team.ru> | 2022-05-10 22:16:03 +0300 |
commit | 09c71d918d4d0b0ebf67e1ab41aa90ddf587a3f2 (patch) | |
tree | dd44d2cb68e2845c2d4c367b66893f3e043a6e8e /contrib/restricted/aws/s2n/tls/s2n_change_cipher_spec.c | |
parent | 5eb4a8a2d487411924e1d1b27c454223dcf35005 (diff) | |
download | ydb-09c71d918d4d0b0ebf67e1ab41aa90ddf587a3f2.tar.gz |
Update contrib/restricted/aws/s2n to 1.3.12
ref:f8279d764b4c00974a63543a1364c91e2b81b7a6
Diffstat (limited to 'contrib/restricted/aws/s2n/tls/s2n_change_cipher_spec.c')
-rw-r--r-- | contrib/restricted/aws/s2n/tls/s2n_change_cipher_spec.c | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/contrib/restricted/aws/s2n/tls/s2n_change_cipher_spec.c b/contrib/restricted/aws/s2n/tls/s2n_change_cipher_spec.c index 19caaa96a1..99dfdfb22a 100644 --- a/contrib/restricted/aws/s2n/tls/s2n_change_cipher_spec.c +++ b/contrib/restricted/aws/s2n/tls/s2n_change_cipher_spec.c @@ -32,7 +32,7 @@ int s2n_basic_ccs_recv(struct s2n_connection *conn) { uint8_t type; - GUARD(s2n_stuffer_read_uint8(&conn->handshake.io, &type)); + POSIX_GUARD(s2n_stuffer_read_uint8(&conn->handshake.io, &type)); S2N_ERROR_IF(type != CHANGE_CIPHER_SPEC_TYPE, S2N_ERR_BAD_MESSAGE); return 0; @@ -40,14 +40,14 @@ int s2n_basic_ccs_recv(struct s2n_connection *conn) int s2n_client_ccs_recv(struct s2n_connection *conn) { - GUARD(s2n_basic_ccs_recv(conn)); + POSIX_GUARD(s2n_basic_ccs_recv(conn)); /* Zero the sequence number */ struct s2n_blob seq = {.data = conn->secure.client_sequence_number,.size = sizeof(conn->secure.client_sequence_number) }; - GUARD(s2n_blob_zero(&seq)); + POSIX_GUARD(s2n_blob_zero(&seq)); /* Compute the finished message */ - GUARD(s2n_prf_client_finished(conn)); + POSIX_GUARD(s2n_prf_client_finished(conn)); /* Update the client to use the cipher-suite */ conn->client = &conn->secure; @@ -55,21 +55,21 @@ int s2n_client_ccs_recv(struct s2n_connection *conn) /* Flush any partial alert messages that were pending. * If we don't do this, an attacker can inject a 1-byte alert message into the handshake * and cause later, valid alerts to be processed incorrectly. */ - GUARD(s2n_stuffer_wipe(&conn->alert_in)); + POSIX_GUARD(s2n_stuffer_wipe(&conn->alert_in)); return 0; } int s2n_server_ccs_recv(struct s2n_connection *conn) { - GUARD(s2n_basic_ccs_recv(conn)); + POSIX_GUARD(s2n_basic_ccs_recv(conn)); /* Zero the sequence number */ struct s2n_blob seq = {.data = conn->secure.server_sequence_number,.size = sizeof(conn->secure.server_sequence_number) }; - GUARD(s2n_blob_zero(&seq)); + POSIX_GUARD(s2n_blob_zero(&seq)); /* Compute the finished message */ - GUARD(s2n_prf_server_finished(conn)); + POSIX_GUARD(s2n_prf_server_finished(conn)); /* Update the secure state to active, and point the client at the active state */ conn->server = &conn->secure; @@ -77,14 +77,14 @@ int s2n_server_ccs_recv(struct s2n_connection *conn) /* Flush any partial alert messages that were pending. * If we don't do this, an attacker can inject a 1-byte alert message into the handshake * and cause later, valid alerts to be processed incorrectly. */ - GUARD(s2n_stuffer_wipe(&conn->alert_in)); + POSIX_GUARD(s2n_stuffer_wipe(&conn->alert_in)); return 0; } int s2n_ccs_send(struct s2n_connection *conn) { - GUARD(s2n_stuffer_write_uint8(&conn->handshake.io, CHANGE_CIPHER_SPEC_TYPE)); + POSIX_GUARD(s2n_stuffer_write_uint8(&conn->handshake.io, CHANGE_CIPHER_SPEC_TYPE)); return 0; } |