Don't get the mac type in TLSv1.3
authorMatt Caswell <matt@openssl.org>
Mon, 14 Jan 2019 16:37:14 +0000 (16:37 +0000)
committerMatt Caswell <matt@openssl.org>
Tue, 15 Jan 2019 11:50:35 +0000 (11:50 +0000)
We don't use this information so we shouldn't fetch it. As noted in the
comments in #8005.

Reviewed-by: Ben Kaduk <kaduk@mit.edu>
(Merged from https://github.com/openssl/openssl/pull/8020)

(cherry picked from commit ea09abc80892920ee5db4de82bed7a193b5896f0)

ssl/tls13_enc.c

index e36b7d3a066ad1363f3976a364d17025f21a486e..d66356681b8468ba08587ee638ded4541073ad37 100644 (file)
@@ -323,11 +323,9 @@ int tls13_setup_key_block(SSL *s)
 {
     const EVP_CIPHER *c;
     const EVP_MD *hash;
-    int mac_type = NID_undef;
 
     s->session->cipher = s->s3->tmp.new_cipher;
-    if (!ssl_cipher_get_evp
-        (s->session, &c, &hash, &mac_type, NULL, NULL, 0)) {
+    if (!ssl_cipher_get_evp(s->session, &c, &hash, NULL, NULL, NULL, 0)) {
         SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS13_SETUP_KEY_BLOCK,
                  SSL_R_CIPHER_OR_HASH_UNAVAILABLE);
         return 0;