aboutsummaryrefslogtreecommitdiffstats
path: root/contrib/restricted/aws/s2n/tls/s2n_change_cipher_spec.c
diff options
context:
space:
mode:
authorthegeorg <thegeorg@yandex-team.ru>2022-05-10 22:16:03 +0300
committerthegeorg <thegeorg@yandex-team.ru>2022-05-10 22:16:03 +0300
commit09c71d918d4d0b0ebf67e1ab41aa90ddf587a3f2 (patch)
treedd44d2cb68e2845c2d4c367b66893f3e043a6e8e /contrib/restricted/aws/s2n/tls/s2n_change_cipher_spec.c
parent5eb4a8a2d487411924e1d1b27c454223dcf35005 (diff)
downloadydb-09c71d918d4d0b0ebf67e1ab41aa90ddf587a3f2.tar.gz
Update contrib/restricted/aws/s2n to 1.3.12
ref:f8279d764b4c00974a63543a1364c91e2b81b7a6
Diffstat (limited to 'contrib/restricted/aws/s2n/tls/s2n_change_cipher_spec.c')
-rw-r--r--contrib/restricted/aws/s2n/tls/s2n_change_cipher_spec.c20
1 files changed, 10 insertions, 10 deletions
diff --git a/contrib/restricted/aws/s2n/tls/s2n_change_cipher_spec.c b/contrib/restricted/aws/s2n/tls/s2n_change_cipher_spec.c
index 19caaa96a1..99dfdfb22a 100644
--- a/contrib/restricted/aws/s2n/tls/s2n_change_cipher_spec.c
+++ b/contrib/restricted/aws/s2n/tls/s2n_change_cipher_spec.c
@@ -32,7 +32,7 @@ int s2n_basic_ccs_recv(struct s2n_connection *conn)
{
uint8_t type;
- GUARD(s2n_stuffer_read_uint8(&conn->handshake.io, &type));
+ POSIX_GUARD(s2n_stuffer_read_uint8(&conn->handshake.io, &type));
S2N_ERROR_IF(type != CHANGE_CIPHER_SPEC_TYPE, S2N_ERR_BAD_MESSAGE);
return 0;
@@ -40,14 +40,14 @@ int s2n_basic_ccs_recv(struct s2n_connection *conn)
int s2n_client_ccs_recv(struct s2n_connection *conn)
{
- GUARD(s2n_basic_ccs_recv(conn));
+ POSIX_GUARD(s2n_basic_ccs_recv(conn));
/* Zero the sequence number */
struct s2n_blob seq = {.data = conn->secure.client_sequence_number,.size = sizeof(conn->secure.client_sequence_number) };
- GUARD(s2n_blob_zero(&seq));
+ POSIX_GUARD(s2n_blob_zero(&seq));
/* Compute the finished message */
- GUARD(s2n_prf_client_finished(conn));
+ POSIX_GUARD(s2n_prf_client_finished(conn));
/* Update the client to use the cipher-suite */
conn->client = &conn->secure;
@@ -55,21 +55,21 @@ int s2n_client_ccs_recv(struct s2n_connection *conn)
/* Flush any partial alert messages that were pending.
* If we don't do this, an attacker can inject a 1-byte alert message into the handshake
* and cause later, valid alerts to be processed incorrectly. */
- GUARD(s2n_stuffer_wipe(&conn->alert_in));
+ POSIX_GUARD(s2n_stuffer_wipe(&conn->alert_in));
return 0;
}
int s2n_server_ccs_recv(struct s2n_connection *conn)
{
- GUARD(s2n_basic_ccs_recv(conn));
+ POSIX_GUARD(s2n_basic_ccs_recv(conn));
/* Zero the sequence number */
struct s2n_blob seq = {.data = conn->secure.server_sequence_number,.size = sizeof(conn->secure.server_sequence_number) };
- GUARD(s2n_blob_zero(&seq));
+ POSIX_GUARD(s2n_blob_zero(&seq));
/* Compute the finished message */
- GUARD(s2n_prf_server_finished(conn));
+ POSIX_GUARD(s2n_prf_server_finished(conn));
/* Update the secure state to active, and point the client at the active state */
conn->server = &conn->secure;
@@ -77,14 +77,14 @@ int s2n_server_ccs_recv(struct s2n_connection *conn)
/* Flush any partial alert messages that were pending.
* If we don't do this, an attacker can inject a 1-byte alert message into the handshake
* and cause later, valid alerts to be processed incorrectly. */
- GUARD(s2n_stuffer_wipe(&conn->alert_in));
+ POSIX_GUARD(s2n_stuffer_wipe(&conn->alert_in));
return 0;
}
int s2n_ccs_send(struct s2n_connection *conn)
{
- GUARD(s2n_stuffer_write_uint8(&conn->handshake.io, CHANGE_CIPHER_SPEC_TYPE));
+ POSIX_GUARD(s2n_stuffer_write_uint8(&conn->handshake.io, CHANGE_CIPHER_SPEC_TYPE));
return 0;
}