fix: formatting and typos

dtls: fix debug message when downgrading

internal.c: fix typo
This commit is contained in:
Marco Oliverio
2022-10-24 10:37:56 +02:00
parent 1388e66059
commit 2c35d7f9d2
2 changed files with 6 additions and 6 deletions

View File

@@ -36,7 +36,7 @@
#ifdef WOLFSSL_DTLS #ifdef WOLFSSL_DTLS
void DtlsResetState(WOLFSSL *ssl) void DtlsResetState(WOLFSSL* ssl)
{ {
/* Reset the state so that we can statelessly await the /* Reset the state so that we can statelessly await the
* ClientHello that contains the cookie. Don't gate on IsAtLeastTLSv1_3 * ClientHello that contains the cookie. Don't gate on IsAtLeastTLSv1_3
@@ -52,7 +52,7 @@ void DtlsResetState(WOLFSSL *ssl)
w64Zero(&ssl->dtls13Epochs[0].nextSeqNumber); w64Zero(&ssl->dtls13Epochs[0].nextSeqNumber);
w64Zero(&ssl->dtls13Epochs[0].nextPeerSeqNumber); w64Zero(&ssl->dtls13Epochs[0].nextPeerSeqNumber);
XMEMSET(ssl->dtls13Epochs[0].window, 0, XMEMSET(ssl->dtls13Epochs[0].window, 0,
sizeof(ssl->dtls13Epochs[0].window)); sizeof(ssl->dtls13Epochs[0].window));
Dtls13FreeFsmResources(ssl); Dtls13FreeFsmResources(ssl);
#endif #endif
ssl->keys.dtls_expected_peer_handshake_number = 0; ssl->keys.dtls_expected_peer_handshake_number = 0;
@@ -62,8 +62,8 @@ void DtlsResetState(WOLFSSL *ssl)
ssl->options.serverState = NULL_STATE; ssl->options.serverState = NULL_STATE;
ssl->options.clientState = NULL_STATE; ssl->options.clientState = NULL_STATE;
ssl->options.connectState = CONNECT_BEGIN; ssl->options.connectState = CONNECT_BEGIN;
ssl->options.acceptState = ACCEPT_BEGIN; ssl->options.acceptState = ACCEPT_BEGIN;
ssl->options.handShakeState = NULL_STATE; ssl->options.handShakeState = NULL_STATE;
ssl->msgsReceived.got_client_hello = 0; ssl->msgsReceived.got_client_hello = 0;
ssl->keys.dtls_handshake_number = 0; ssl->keys.dtls_handshake_number = 0;
ssl->keys.dtls_expected_peer_handshake_number = 0; ssl->keys.dtls_expected_peer_handshake_number = 0;

View File

@@ -32782,7 +32782,7 @@ static int DoSessionTicket(WOLFSSL* ssl, const byte* input, word32* inOutIdx,
* was created, timeout value and the current time. If the tickets are * was created, timeout value and the current time. If the tickets are
* judged expired, falls back to full-handshake. If you want disable this * judged expired, falls back to full-handshake. If you want disable this
* session ticket validation check in TLS1.2 and below, define * session ticket validation check in TLS1.2 and below, define
* WOLFSSL_NO_TICKET_EXPRE. * WOLFSSL_NO_TICKET_EXPIRE.
*/ */
int HandleTlsResumption(WOLFSSL* ssl, int bogusID, Suites* clSuites) int HandleTlsResumption(WOLFSSL* ssl, int bogusID, Suites* clSuites)
{ {
@@ -33057,7 +33057,7 @@ static int DoSessionTicket(WOLFSSL* ssl, const byte* input, word32* inOutIdx,
return ret; return ret;
} }
else if (pv.minor == DTLS_MINOR) { else if (pv.minor == DTLS_MINOR) {
WOLFSSL_MSG("\tDowngrading to DTLSv1.2"); WOLFSSL_MSG("\tDowngrading to DTLSv1.0");
ssl->options.tls1_3 = 0; ssl->options.tls1_3 = 0;
ssl->version.minor = DTLS_MINOR; ssl->version.minor = DTLS_MINOR;
} }