diff options
author | lloyd <[email protected]> | 2010-04-17 18:56:53 +0000 |
---|---|---|
committer | lloyd <[email protected]> | 2010-04-17 18:56:53 +0000 |
commit | aaa9e92697e16278fb91552f075c020f2b4c26cb (patch) | |
tree | 1393248e823a35f7134894e60174f0e65a62d876 /src/ssl/tls_server.cpp | |
parent | 0abc80f498c6bc2e8f630e34b90d5c6d24c29f58 (diff) |
Clean up ciphersuite handling
Diffstat (limited to 'src/ssl/tls_server.cpp')
-rw-r--r-- | src/ssl/tls_server.cpp | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/ssl/tls_server.cpp b/src/ssl/tls_server.cpp index 47902a71c..4e9c3583f 100644 --- a/src/ssl/tls_server.cpp +++ b/src/ssl/tls_server.cpp @@ -358,7 +358,7 @@ void TLS_Server::process_handshake_msg(Handshake_Type type, state->suite = CipherSuite(state->server_hello->ciphersuite()); - if(state->suite.sig_type() != CipherSuite::NO_SIG) + if(state->suite.sig_type() != TLS_ALGO_SIGNER_ANON) { // FIXME: should choose certs based on sig type state->server_certs = new Certificate(writer, cert_chain, @@ -366,14 +366,14 @@ void TLS_Server::process_handshake_msg(Handshake_Type type, } state->kex_priv = PKCS8::copy_key(*private_key, rng); - if(state->suite.kex_type() != CipherSuite::NO_KEX) + if(state->suite.kex_type() != TLS_ALGO_KEYEXCH_NOKEX) { - if(state->suite.kex_type() == CipherSuite::RSA_KEX) + if(state->suite.kex_type() == TLS_ALGO_KEYEXCH_RSA) { state->kex_priv = new RSA_PrivateKey(rng, policy->rsa_export_keysize()); } - else if(state->suite.kex_type() == CipherSuite::DH_KEX) + else if(state->suite.kex_type() == TLS_ALGO_KEYEXCH_DH) { state->kex_priv = new DH_PrivateKey(rng, policy->dh_group()); } |