Convert SSL_TRANSCRIPT to C++.
Bug: 132
Change-Id: I2d7cb45d56e8dcb223fbc5838922fdbe6f28ded7
Reviewed-on: https://boringssl-review.googlesource.com/18264
Reviewed-by: Steven Valdez <svaldez@google.com>
Commit-Queue: Steven Valdez <svaldez@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/ssl/t1_enc.cc b/ssl/t1_enc.cc
index 4fbc6c4..2349df0 100644
--- a/ssl/t1_enc.cc
+++ b/ssl/t1_enc.cc
@@ -443,10 +443,9 @@
if (hs->extended_master_secret) {
uint8_t digests[EVP_MAX_MD_SIZE];
size_t digests_len;
- if (!SSL_TRANSCRIPT_get_hash(&hs->transcript, digests, &digests_len) ||
- !tls1_prf(SSL_TRANSCRIPT_md(&hs->transcript), out,
- SSL3_MASTER_SECRET_SIZE, premaster, premaster_len,
- TLS_MD_EXTENDED_MASTER_SECRET_CONST,
+ if (!hs->transcript.GetHash(digests, &digests_len) ||
+ !tls1_prf(hs->transcript.Digest(), out, SSL3_MASTER_SECRET_SIZE,
+ premaster, premaster_len, TLS_MD_EXTENDED_MASTER_SECRET_CONST,
TLS_MD_EXTENDED_MASTER_SECRET_CONST_SIZE, digests,
digests_len, NULL, 0)) {
return 0;
@@ -460,11 +459,11 @@
return 0;
}
} else {
- if (!tls1_prf(SSL_TRANSCRIPT_md(&hs->transcript), out,
- SSL3_MASTER_SECRET_SIZE, premaster, premaster_len,
- TLS_MD_MASTER_SECRET_CONST, TLS_MD_MASTER_SECRET_CONST_SIZE,
- ssl->s3->client_random, SSL3_RANDOM_SIZE,
- ssl->s3->server_random, SSL3_RANDOM_SIZE)) {
+ if (!tls1_prf(hs->transcript.Digest(), out, SSL3_MASTER_SECRET_SIZE,
+ premaster, premaster_len, TLS_MD_MASTER_SECRET_CONST,
+ TLS_MD_MASTER_SECRET_CONST_SIZE, ssl->s3->client_random,
+ SSL3_RANDOM_SIZE, ssl->s3->server_random,
+ SSL3_RANDOM_SIZE)) {
return 0;
}
}