@@ -396,15 +396,13 @@ impl EchState {
396
396
false => self . enc . 0 . clone ( ) ,
397
397
} ;
398
398
399
- fn outer_hello_ext ( ctx : & EchState , enc : Vec < u8 > , payload : Vec < u8 > ) -> ClientExtension {
400
- ClientExtension :: EncryptedClientHello ( EncryptedClientHello :: Outer (
401
- EncryptedClientHelloOuter {
402
- cipher_suite : ctx. cipher_suite ,
403
- config_id : ctx. config_id ,
404
- enc : PayloadU16 :: new ( enc) ,
405
- payload : PayloadU16 :: new ( payload) ,
406
- } ,
407
- ) )
399
+ fn outer_hello_ext ( ctx : & EchState , enc : Vec < u8 > , payload : Vec < u8 > ) -> EncryptedClientHello {
400
+ EncryptedClientHello :: Outer ( EncryptedClientHelloOuter {
401
+ cipher_suite : ctx. cipher_suite ,
402
+ config_id : ctx. config_id ,
403
+ enc : PayloadU16 :: new ( enc) ,
404
+ payload : PayloadU16 :: new ( payload) ,
405
+ } )
408
406
}
409
407
410
408
// The outer handshake is not permitted to resume a session. If we're resuming in the
@@ -418,7 +416,11 @@ impl EchState {
418
416
// To compute the encoded AAD we add a placeholder extension with an empty payload.
419
417
outer_hello
420
418
. extensions
421
- . push ( outer_hello_ext ( self , enc. clone ( ) , vec ! [ 0 ; payload_len] ) ) ;
419
+ . push ( ClientExtension :: EncryptedClientHello ( outer_hello_ext (
420
+ self ,
421
+ enc. clone ( ) ,
422
+ vec ! [ 0 ; payload_len] ,
423
+ ) ) ) ;
422
424
423
425
// Next we compute the proper extension payload.
424
426
let payload = self
@@ -429,7 +431,9 @@ impl EchState {
429
431
outer_hello. extensions . pop ( ) ;
430
432
outer_hello
431
433
. extensions
432
- . push ( outer_hello_ext ( self , enc, payload) ) ;
434
+ . push ( ClientExtension :: EncryptedClientHello ( outer_hello_ext (
435
+ self , enc, payload,
436
+ ) ) ) ;
433
437
434
438
Ok ( outer_hello)
435
439
}
0 commit comments