Skip to content

Commit e965064

Browse files
committed
Refactor TlsClientProtocol
1 parent 43d757a commit e965064

File tree

1 file changed

+9
-8
lines changed

1 file changed

+9
-8
lines changed

tls/src/main/java/org/bouncycastle/tls/TlsClientProtocol.java

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -902,15 +902,15 @@ protected void process13HelloRetryRequest(ServerHello helloRetryRequest)
902902
}
903903
}
904904

905-
final int selected_group = TlsExtensionsUtils.getKeyShareHelloRetryRequest(extensions);
905+
final int selectedGroup = TlsExtensionsUtils.getKeyShareHelloRetryRequest(extensions);
906906

907907
/*
908908
* TODO[tls:psk_ke]
909909
*
910910
* RFC 8446 4.2.8. Servers [..] MUST NOT send a KeyShareEntry when using the "psk_ke"
911911
* PskKeyExchangeMode.
912912
*/
913-
if (selected_group < 0)
913+
if (selectedGroup < 0)
914914
{
915915
throw new TlsFatalAlert(AlertDescription.missing_extension,
916916
"missing extension response: " + ExtensionType.getText(ExtensionType.key_share));
@@ -925,7 +925,7 @@ protected void process13HelloRetryRequest(ServerHello helloRetryRequest)
925925
* MUST abort the handshake with an "illegal_parameter" alert.
926926
*/
927927
if (!TlsUtils.isValidKeyShareSelection(server_version, securityParameters.getClientSupportedGroups(),
928-
clientAgreements, selected_group))
928+
clientAgreements, selectedGroup))
929929
{
930930
throw new TlsFatalAlert(AlertDescription.illegal_parameter, "invalid key_share selected");
931931
}
@@ -946,7 +946,7 @@ protected void process13HelloRetryRequest(ServerHello helloRetryRequest)
946946

947947
this.clientAgreements = null;
948948
this.retryCookie = cookie;
949-
this.retryGroup = selected_group;
949+
this.retryGroup = selectedGroup;
950950
}
951951

952952
protected void process13ServerHello(ServerHello serverHello, boolean afterHelloRetryRequest)
@@ -1051,8 +1051,8 @@ protected void process13ServerHello(ServerHello serverHello, boolean afterHelloR
10511051

10521052
TlsSecret sharedSecret = null;
10531053
{
1054-
KeyShareEntry keyShareEntry = TlsExtensionsUtils.getKeyShareServerHello(extensions);
1055-
if (null == keyShareEntry)
1054+
KeyShareEntry serverShare = TlsExtensionsUtils.getKeyShareServerHello(extensions);
1055+
if (null == serverShare)
10561056
{
10571057
if (afterHelloRetryRequest
10581058
|| null == pskEarlySecret
@@ -1069,14 +1069,15 @@ protected void process13ServerHello(ServerHello serverHello, boolean afterHelloR
10691069
throw new TlsFatalAlert(AlertDescription.illegal_parameter);
10701070
}
10711071

1072-
int namedGroup = keyShareEntry.getNamedGroup();
1072+
int namedGroup = serverShare.getNamedGroup();
1073+
10731074
TlsAgreement agreement = (TlsAgreement)clientAgreements.get(Integers.valueOf(namedGroup));
10741075
if (null == agreement)
10751076
{
10761077
throw new TlsFatalAlert(AlertDescription.illegal_parameter);
10771078
}
10781079

1079-
agreement.receivePeerValue(keyShareEntry.getKeyExchange());
1080+
agreement.receivePeerValue(serverShare.getKeyExchange());
10801081
sharedSecret = agreement.calculateSecret();
10811082
}
10821083
}

0 commit comments

Comments
 (0)