Rename ssl3_send_alert and ssl3_protocol_version.
These are common between TLS and DTLS so should not have the ssl3_
prefix. (TLS-only stuff should really have a tls_ prefix, but we still
have a lot of that one.)
This also fixes a stray reference to ssl3_send_client_key_exchange..
Change-Id: Ia05b360aa090ab3b5f075d5f80f133cbfe0520d4
Reviewed-on: https://boringssl-review.googlesource.com/21346
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
Reviewed-by: Steven Valdez <svaldez@google.com>
diff --git a/ssl/tls_record.cc b/ssl/tls_record.cc
index 83453ee..ba38bc9 100644
--- a/ssl/tls_record.cc
+++ b/ssl/tls_record.cc
@@ -541,7 +541,7 @@
// Warning alerts do not exist in TLS 1.3.
if (ssl->s3->have_version &&
- ssl3_protocol_version(ssl) >= TLS1_3_VERSION) {
+ ssl_protocol_version(ssl) >= TLS1_3_VERSION) {
*out_alert = SSL_AD_DECODE_ERROR;
OPENSSL_PUT_ERROR(SSL, SSL_R_BAD_ALERT);
return ssl_open_record_error;
@@ -579,7 +579,7 @@
// and below.
if (SSL_in_init(ssl) ||
SSL_is_dtls(ssl) ||
- ssl3_protocol_version(ssl) > TLS1_2_VERSION) {
+ ssl_protocol_version(ssl) > TLS1_2_VERSION) {
assert(false);
*out_alert = SSL_AD_INTERNAL_ERROR;
return OpenRecordResult::kError;
@@ -635,7 +635,7 @@
// and below.
if (SSL_in_init(ssl) ||
SSL_is_dtls(ssl) ||
- ssl3_protocol_version(ssl) > TLS1_2_VERSION) {
+ ssl_protocol_version(ssl) > TLS1_2_VERSION) {
assert(false);
OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR);
return false;