aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/msg_server_kex.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'src/tls/msg_server_kex.cpp')
-rw-r--r--src/tls/msg_server_kex.cpp16
1 files changed, 8 insertions, 8 deletions
diff --git a/src/tls/msg_server_kex.cpp b/src/tls/msg_server_kex.cpp
index 2d27c6f0d..6e238c4fd 100644
--- a/src/tls/msg_server_kex.cpp
+++ b/src/tls/msg_server_kex.cpp
@@ -35,7 +35,7 @@ Server_Key_Exchange::Server_Key_Exchange(Handshake_IO& io,
const Private_Key* signing_key) :
m_kex_key(nullptr), m_srp_params(nullptr)
{
- const std::string hostname = state->client_hello->sni_hostname();
+ const std::string hostname = state->client_hello()->sni_hostname();
const std::string kex_algo = state->suite.kex_algo();
if(kex_algo == "PSK" || kex_algo == "DHE_PSK" || kex_algo == "ECDHE_PSK")
@@ -58,7 +58,7 @@ Server_Key_Exchange::Server_Key_Exchange(Handshake_IO& io,
else if(kex_algo == "ECDH" || kex_algo == "ECDHE_PSK")
{
const std::vector<std::string>& curves =
- state->client_hello->supported_ecc_curves();
+ state->client_hello()->supported_ecc_curves();
if(curves.empty())
throw Internal_Error("Client sent no ECC extension but we negotiated ECDH");
@@ -91,7 +91,7 @@ Server_Key_Exchange::Server_Key_Exchange(Handshake_IO& io,
}
else if(kex_algo == "SRP_SHA")
{
- const std::string srp_identifier = state->client_hello->srp_identifier();
+ const std::string srp_identifier = state->client_hello()->srp_identifier();
std::string group_id;
BigInt v;
@@ -130,8 +130,8 @@ Server_Key_Exchange::Server_Key_Exchange(Handshake_IO& io,
PK_Signer signer(*signing_key, format.first, format.second);
- signer.update(state->client_hello->random());
- signer.update(state->server_hello->random());
+ signer.update(state->client_hello()->random());
+ signer.update(state->server_hello()->random());
signer.update(params());
m_signature = signer.signature(rng);
}
@@ -270,8 +270,8 @@ bool Server_Key_Exchange::verify(const X509_Certificate& cert,
PK_Verifier verifier(*key, format.first, format.second);
- verifier.update(state->client_hello->random());
- verifier.update(state->server_hello->random());
+ verifier.update(state->client_hello()->random());
+ verifier.update(state->server_hello()->random());
verifier.update(params());
return verifier.check_signature(m_signature);
@@ -284,7 +284,7 @@ const Private_Key& Server_Key_Exchange::server_kex_key() const
}
// Only valid for SRP negotiation
-SRP6_Server_Session& Server_Key_Exchange::server_srp_params()
+SRP6_Server_Session& Server_Key_Exchange::server_srp_params() const
{
BOTAN_ASSERT_NONNULL(m_srp_params);
return *m_srp_params;