aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/tls_extensions.cpp
diff options
context:
space:
mode:
authorlloyd <[email protected]>2012-01-19 18:14:20 +0000
committerlloyd <[email protected]>2012-01-19 18:14:20 +0000
commit265cf8e312723e688f4dbc8e4d90e0eae5445c97 (patch)
tree4532f1435286ad17cc3752ba77b71e59af622bbf /src/tls/tls_extensions.cpp
parent239241568d4d3ff14d2d1994e5829f3d548f2078 (diff)
Kinda maybe working TLS 1.2 for clients. Not well tested at all, but a
basic connection with a GnuTLS server does work. Currently we don't respect the signature_algorithms extension at all, and using SHA-256 with a 12-byte finished value is hardcoded though the spec is that it can depend on the ciphersuite (likely relevant for GOST ciphersuites in particular).
Diffstat (limited to 'src/tls/tls_extensions.cpp')
-rw-r--r--src/tls/tls_extensions.cpp6
1 files changed, 3 insertions, 3 deletions
diff --git a/src/tls/tls_extensions.cpp b/src/tls/tls_extensions.cpp
index d414a979d..9f80744f9 100644
--- a/src/tls/tls_extensions.cpp
+++ b/src/tls/tls_extensions.cpp
@@ -288,7 +288,7 @@ TLS_Ciphersuite_Algos Signature_Algorithms::hash_algo_code(byte code)
case 6:
return TLS_ALGO_HASH_SHA512;
default:
- return TLS_ALGO_UNKNOWN;
+ return TLS_ALGO_NONE;
}
}
@@ -324,7 +324,7 @@ TLS_Ciphersuite_Algos Signature_Algorithms::sig_algo_code(byte code)
case 3:
return TLS_ALGO_SIGNER_ECDSA;
default:
- return TLS_ALGO_UNKNOWN;
+ return TLS_ALGO_NONE;
}
}
@@ -399,7 +399,7 @@ Signature_Algorithms::Signature_Algorithms(TLS_Data_Reader& reader,
TLS_Ciphersuite_Algos sig_code = sig_algo_code(reader.get_byte());
// If not something we know, ignore completely
- if(hash_code == TLS_ALGO_UNKNOWN || sig_code == TLS_ALGO_UNKNOWN)
+ if(hash_code == TLS_ALGO_NONE || sig_code == TLS_ALGO_NONE)
continue;
m_supported_algos.push_back(std::make_pair(hash_code, sig_code));