diff --git a/library/ssl_misc.h b/library/ssl_misc.h index fb261a0d6..ea891f44a 100644 --- a/library/ssl_misc.h +++ b/library/ssl_misc.h @@ -681,7 +681,7 @@ struct mbedtls_ssl_handshake_params unsigned char early [MBEDTLS_MD_MAX_SIZE]; unsigned char handshake[MBEDTLS_MD_MAX_SIZE]; unsigned char app [MBEDTLS_MD_MAX_SIZE]; - } tls13_master_secrets; + } tls1_3_master_secrets; #endif /* MBEDTLS_SSL_PROTO_TLS1_3_EXPERIMENTAL */ #if defined(MBEDTLS_SSL_SESSION_TICKETS) @@ -1511,10 +1511,10 @@ void mbedtls_ssl_tls13_add_hs_hdr_to_checksum( mbedtls_ssl_context *ssl, /* * Update checksum of handshake messages. */ -void mbedtls_ssl_tls13_add_hs_msg_to_checksum( mbedtls_ssl_context *ssl, - unsigned hs_type, - unsigned char const *msg, - size_t msg_len ); +void mbedtls_ssl_tls1_3_add_hs_msg_to_checksum( mbedtls_ssl_context *ssl, + unsigned hs_type, + unsigned char const *msg, + size_t msg_len ); #if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) /* diff --git a/library/ssl_tls13_generic.c b/library/ssl_tls13_generic.c index bac11787d..c8f6dc797 100644 --- a/library/ssl_tls13_generic.c +++ b/library/ssl_tls13_generic.c @@ -66,10 +66,10 @@ cleanup: return( ret ); } -void mbedtls_ssl_tls13_add_hs_msg_to_checksum( mbedtls_ssl_context *ssl, - unsigned hs_type, - unsigned char const *msg, - size_t msg_len ) +void mbedtls_ssl_tls1_3_add_hs_msg_to_checksum( mbedtls_ssl_context *ssl, + unsigned hs_type, + unsigned char const *msg, + size_t msg_len ) { mbedtls_ssl_tls13_add_hs_hdr_to_checksum( ssl, hs_type, msg_len ); ssl->handshake->update_checksum( ssl, msg, msg_len ); diff --git a/library/ssl_tls13_keys.c b/library/ssl_tls13_keys.c index 32b68666b..2d504f068 100644 --- a/library/ssl_tls13_keys.c +++ b/library/ssl_tls13_keys.c @@ -822,7 +822,7 @@ int mbedtls_ssl_tls13_populate_transform( mbedtls_ssl_transform *transform, return( 0 ); } -int mbedtls_ssl_tls13_key_schedule_stage_early( mbedtls_ssl_context *ssl ) +int mbedtls_ssl_tls1_3_key_schedule_stage_early( mbedtls_ssl_context *ssl ) { int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED; mbedtls_md_type_t md_type; @@ -840,7 +840,7 @@ int mbedtls_ssl_tls13_key_schedule_stage_early( mbedtls_ssl_context *ssl ) input_len = ssl->handshake->psk_len; #endif ret = mbedtls_ssl_tls1_3_evolve_secret( md_type, NULL, input, input_len, - ssl->handshake->tls13_master_secrets.early ); + ssl->handshake->tls1_3_master_secrets.early ); if( ret != 0 ) { MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_tls1_3_evolve_secret", ret ); diff --git a/library/ssl_tls13_keys.h b/library/ssl_tls13_keys.h index 7a41db13d..45b0fdfa4 100644 --- a/library/ssl_tls13_keys.h +++ b/library/ssl_tls13_keys.h @@ -555,6 +555,6 @@ int mbedtls_ssl_tls13_populate_transform( mbedtls_ssl_transform *transform, * \returns \c 0 on success. * \returns A negative error code on failure. */ -int mbedtls_ssl_tls13_key_schedule_stage_early( mbedtls_ssl_context *ssl ); +int mbedtls_ssl_tls1_3_key_schedule_stage_early( mbedtls_ssl_context *ssl ); #endif /* MBEDTLS_SSL_TLS1_3_KEYS_H */