mirror of https://github.com/wolfSSL/wolfssl.git
fix: formatting and typos
dtls: fix debug message when downgrading internal.c: fix typopull/5716/head
parent
1388e66059
commit
2c35d7f9d2
|
@ -36,7 +36,7 @@
|
|||
|
||||
#ifdef WOLFSSL_DTLS
|
||||
|
||||
void DtlsResetState(WOLFSSL *ssl)
|
||||
void DtlsResetState(WOLFSSL* ssl)
|
||||
{
|
||||
/* Reset the state so that we can statelessly await the
|
||||
* ClientHello that contains the cookie. Don't gate on IsAtLeastTLSv1_3
|
||||
|
@ -52,7 +52,7 @@ void DtlsResetState(WOLFSSL *ssl)
|
|||
w64Zero(&ssl->dtls13Epochs[0].nextSeqNumber);
|
||||
w64Zero(&ssl->dtls13Epochs[0].nextPeerSeqNumber);
|
||||
XMEMSET(ssl->dtls13Epochs[0].window, 0,
|
||||
sizeof(ssl->dtls13Epochs[0].window));
|
||||
sizeof(ssl->dtls13Epochs[0].window));
|
||||
Dtls13FreeFsmResources(ssl);
|
||||
#endif
|
||||
ssl->keys.dtls_expected_peer_handshake_number = 0;
|
||||
|
@ -62,8 +62,8 @@ void DtlsResetState(WOLFSSL *ssl)
|
|||
ssl->options.serverState = NULL_STATE;
|
||||
ssl->options.clientState = NULL_STATE;
|
||||
ssl->options.connectState = CONNECT_BEGIN;
|
||||
ssl->options.acceptState = ACCEPT_BEGIN;
|
||||
ssl->options.handShakeState = NULL_STATE;
|
||||
ssl->options.acceptState = ACCEPT_BEGIN;
|
||||
ssl->options.handShakeState = NULL_STATE;
|
||||
ssl->msgsReceived.got_client_hello = 0;
|
||||
ssl->keys.dtls_handshake_number = 0;
|
||||
ssl->keys.dtls_expected_peer_handshake_number = 0;
|
||||
|
|
|
@ -32782,7 +32782,7 @@ static int DoSessionTicket(WOLFSSL* ssl, const byte* input, word32* inOutIdx,
|
|||
* was created, timeout value and the current time. If the tickets are
|
||||
* judged expired, falls back to full-handshake. If you want disable this
|
||||
* session ticket validation check in TLS1.2 and below, define
|
||||
* WOLFSSL_NO_TICKET_EXPRE.
|
||||
* WOLFSSL_NO_TICKET_EXPIRE.
|
||||
*/
|
||||
int HandleTlsResumption(WOLFSSL* ssl, int bogusID, Suites* clSuites)
|
||||
{
|
||||
|
@ -33057,7 +33057,7 @@ static int DoSessionTicket(WOLFSSL* ssl, const byte* input, word32* inOutIdx,
|
|||
return ret;
|
||||
}
|
||||
else if (pv.minor == DTLS_MINOR) {
|
||||
WOLFSSL_MSG("\tDowngrading to DTLSv1.2");
|
||||
WOLFSSL_MSG("\tDowngrading to DTLSv1.0");
|
||||
ssl->options.tls1_3 = 0;
|
||||
ssl->version.minor = DTLS_MINOR;
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue