aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/tls_handshake_hash.h
diff options
context:
space:
mode:
authorlloyd <[email protected]>2012-01-19 18:14:20 +0000
committerlloyd <[email protected]>2012-01-19 18:14:20 +0000
commit265cf8e312723e688f4dbc8e4d90e0eae5445c97 (patch)
tree4532f1435286ad17cc3752ba77b71e59af622bbf /src/tls/tls_handshake_hash.h
parent239241568d4d3ff14d2d1994e5829f3d548f2078 (diff)
Kinda maybe working TLS 1.2 for clients. Not well tested at all, but a
basic connection with a GnuTLS server does work. Currently we don't respect the signature_algorithms extension at all, and using SHA-256 with a 12-byte finished value is hardcoded though the spec is that it can depend on the ciphersuite (likely relevant for GOST ciphersuites in particular).
Diffstat (limited to 'src/tls/tls_handshake_hash.h')
-rw-r--r--src/tls/tls_handshake_hash.h4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/tls/tls_handshake_hash.h b/src/tls/tls_handshake_hash.h
index 4ee1fc1b9..1ca11b99f 100644
--- a/src/tls/tls_handshake_hash.h
+++ b/src/tls/tls_handshake_hash.h
@@ -33,8 +33,8 @@ class TLS_Handshake_Hash
void update(Handshake_Type handshake_type,
const MemoryRegion<byte>& handshake_msg);
- SecureVector<byte> final();
- SecureVector<byte> final_ssl3(const MemoryRegion<byte>&);
+ SecureVector<byte> final(Version_Code version);
+ SecureVector<byte> final_ssl3(const MemoryRegion<byte>& master_secret);
const SecureVector<byte>& get_contents() const
{ return data; }