Go through SSL_PROTOCOL_METHOD in the handshake. The handshake should be generic between TLS and DTLS. Change-Id: I6feb2f013dd5d771f206750653ab9d117d7ea716 Reviewed-on: https://boringssl-review.googlesource.com/21348 Commit-Queue: David Benjamin <davidben@google.com> Reviewed-by: Steven Valdez <svaldez@google.com>
diff --git a/ssl/tls13_client.cc b/ssl/tls13_client.cc index 7ed9fad..b02ee14 100644 --- a/ssl/tls13_client.cc +++ b/ssl/tls13_client.cc
@@ -357,7 +357,7 @@ // If not sending early data, set client traffic keys now so that alerts are // encrypted. if ((ssl_is_resumption_client_ccs_experiment(ssl->version) && - !ssl3_add_change_cipher_spec(ssl)) || + !ssl->method->add_change_cipher_spec(ssl)) || !tls13_set_traffic_key(ssl, evp_aead_seal, hs->client_handshake_secret, hs->hash_len)) { return ssl_hs_error; @@ -565,7 +565,7 @@ if (hs->early_data_offered) { if ((ssl_is_resumption_client_ccs_experiment(ssl->version) && - !ssl3_add_change_cipher_spec(ssl)) || + !ssl->method->add_change_cipher_spec(ssl)) || !tls13_set_traffic_key(ssl, evp_aead_seal, hs->client_handshake_secret, hs->hash_len)) { return ssl_hs_error;
diff --git a/ssl/tls13_server.cc b/ssl/tls13_server.cc index e372a0d..f89e766 100644 --- a/ssl/tls13_server.cc +++ b/ssl/tls13_server.cc
@@ -552,7 +552,7 @@ } if (ssl_is_resumption_experiment(ssl->version) && - !ssl3_add_change_cipher_spec(ssl)) { + !ssl->method->add_change_cipher_spec(ssl)) { return ssl_hs_error; }