forked from wolfSSL/wolfssl
fix: formatting and typos
dtls: fix debug message when downgrading internal.c: fix typo
This commit is contained in:
@@ -36,7 +36,7 @@
|
|||||||
|
|
||||||
#ifdef WOLFSSL_DTLS
|
#ifdef WOLFSSL_DTLS
|
||||||
|
|
||||||
void DtlsResetState(WOLFSSL *ssl)
|
void DtlsResetState(WOLFSSL* ssl)
|
||||||
{
|
{
|
||||||
/* Reset the state so that we can statelessly await the
|
/* Reset the state so that we can statelessly await the
|
||||||
* ClientHello that contains the cookie. Don't gate on IsAtLeastTLSv1_3
|
* ClientHello that contains the cookie. Don't gate on IsAtLeastTLSv1_3
|
||||||
@@ -52,7 +52,7 @@ void DtlsResetState(WOLFSSL *ssl)
|
|||||||
w64Zero(&ssl->dtls13Epochs[0].nextSeqNumber);
|
w64Zero(&ssl->dtls13Epochs[0].nextSeqNumber);
|
||||||
w64Zero(&ssl->dtls13Epochs[0].nextPeerSeqNumber);
|
w64Zero(&ssl->dtls13Epochs[0].nextPeerSeqNumber);
|
||||||
XMEMSET(ssl->dtls13Epochs[0].window, 0,
|
XMEMSET(ssl->dtls13Epochs[0].window, 0,
|
||||||
sizeof(ssl->dtls13Epochs[0].window));
|
sizeof(ssl->dtls13Epochs[0].window));
|
||||||
Dtls13FreeFsmResources(ssl);
|
Dtls13FreeFsmResources(ssl);
|
||||||
#endif
|
#endif
|
||||||
ssl->keys.dtls_expected_peer_handshake_number = 0;
|
ssl->keys.dtls_expected_peer_handshake_number = 0;
|
||||||
@@ -62,8 +62,8 @@ void DtlsResetState(WOLFSSL *ssl)
|
|||||||
ssl->options.serverState = NULL_STATE;
|
ssl->options.serverState = NULL_STATE;
|
||||||
ssl->options.clientState = NULL_STATE;
|
ssl->options.clientState = NULL_STATE;
|
||||||
ssl->options.connectState = CONNECT_BEGIN;
|
ssl->options.connectState = CONNECT_BEGIN;
|
||||||
ssl->options.acceptState = ACCEPT_BEGIN;
|
ssl->options.acceptState = ACCEPT_BEGIN;
|
||||||
ssl->options.handShakeState = NULL_STATE;
|
ssl->options.handShakeState = NULL_STATE;
|
||||||
ssl->msgsReceived.got_client_hello = 0;
|
ssl->msgsReceived.got_client_hello = 0;
|
||||||
ssl->keys.dtls_handshake_number = 0;
|
ssl->keys.dtls_handshake_number = 0;
|
||||||
ssl->keys.dtls_expected_peer_handshake_number = 0;
|
ssl->keys.dtls_expected_peer_handshake_number = 0;
|
||||||
|
@@ -32782,7 +32782,7 @@ static int DoSessionTicket(WOLFSSL* ssl, const byte* input, word32* inOutIdx,
|
|||||||
* was created, timeout value and the current time. If the tickets are
|
* was created, timeout value and the current time. If the tickets are
|
||||||
* judged expired, falls back to full-handshake. If you want disable this
|
* judged expired, falls back to full-handshake. If you want disable this
|
||||||
* session ticket validation check in TLS1.2 and below, define
|
* session ticket validation check in TLS1.2 and below, define
|
||||||
* WOLFSSL_NO_TICKET_EXPRE.
|
* WOLFSSL_NO_TICKET_EXPIRE.
|
||||||
*/
|
*/
|
||||||
int HandleTlsResumption(WOLFSSL* ssl, int bogusID, Suites* clSuites)
|
int HandleTlsResumption(WOLFSSL* ssl, int bogusID, Suites* clSuites)
|
||||||
{
|
{
|
||||||
@@ -33057,7 +33057,7 @@ static int DoSessionTicket(WOLFSSL* ssl, const byte* input, word32* inOutIdx,
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
else if (pv.minor == DTLS_MINOR) {
|
else if (pv.minor == DTLS_MINOR) {
|
||||||
WOLFSSL_MSG("\tDowngrading to DTLSv1.2");
|
WOLFSSL_MSG("\tDowngrading to DTLSv1.0");
|
||||||
ssl->options.tls1_3 = 0;
|
ssl->options.tls1_3 = 0;
|
||||||
ssl->version.minor = DTLS_MINOR;
|
ssl->version.minor = DTLS_MINOR;
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user