summaryrefslogtreecommitdiff
path: root/lib/auth_rsa.c
diff options
context:
space:
mode:
Diffstat (limited to 'lib/auth_rsa.c')
-rw-r--r--lib/auth_rsa.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/lib/auth_rsa.c b/lib/auth_rsa.c
index 7113b04650..6e95ce17ce 100644
--- a/lib/auth_rsa.c
+++ b/lib/auth_rsa.c
@@ -249,7 +249,7 @@ _gnutls_proc_rsa_client_kx (gnutls_session_t session, opaque * data,
ret = _gnutls_pkcs1_rsa_decrypt (&plaintext, &ciphertext, params, params_len, 2); /* btype==2 */
- if (ret < 0 || plaintext.size != TLS_MASTER_SIZE)
+ if (ret < 0 || plaintext.size != GNUTLS_MASTER_SIZE)
{
/* In case decryption fails then don't inform
* the peer. Just use a random key. (in order to avoid
@@ -281,7 +281,7 @@ _gnutls_proc_rsa_client_kx (gnutls_session_t session, opaque * data,
if (randomize_key != 0)
{
- session->key->key.size = TLS_MASTER_SIZE;
+ session->key->key.size = GNUTLS_MASTER_SIZE;
session->key->key.data = gnutls_malloc (session->key->key.size);
if (session->key->key.data == NULL)
{
@@ -338,7 +338,7 @@ _gnutls_gen_rsa_client_kx (gnutls_session_t session, opaque ** data)
return GNUTLS_E_INSUFFICIENT_CREDENTIALS;
}
- session->key->key.size = TLS_MASTER_SIZE;
+ session->key->key.size = GNUTLS_MASTER_SIZE;
session->key->key.data = gnutls_secure_malloc (session->key->key.size);
if (session->key->key.data == NULL)