fix: formatting and typos

dtls: fix debug message when downgrading

internal.c: fix typo
pull/5716/head
Marco Oliverio 2022-10-24 10:37:56 +02:00
parent 1388e66059
commit 2c35d7f9d2
2 changed files with 6 additions and 6 deletions

View File

@ -36,7 +36,7 @@
#ifdef WOLFSSL_DTLS
void DtlsResetState(WOLFSSL *ssl)
void DtlsResetState(WOLFSSL* ssl)
{
/* Reset the state so that we can statelessly await the
* ClientHello that contains the cookie. Don't gate on IsAtLeastTLSv1_3
@ -52,7 +52,7 @@ void DtlsResetState(WOLFSSL *ssl)
w64Zero(&ssl->dtls13Epochs[0].nextSeqNumber);
w64Zero(&ssl->dtls13Epochs[0].nextPeerSeqNumber);
XMEMSET(ssl->dtls13Epochs[0].window, 0,
sizeof(ssl->dtls13Epochs[0].window));
sizeof(ssl->dtls13Epochs[0].window));
Dtls13FreeFsmResources(ssl);
#endif
ssl->keys.dtls_expected_peer_handshake_number = 0;
@ -62,8 +62,8 @@ void DtlsResetState(WOLFSSL *ssl)
ssl->options.serverState = NULL_STATE;
ssl->options.clientState = NULL_STATE;
ssl->options.connectState = CONNECT_BEGIN;
ssl->options.acceptState = ACCEPT_BEGIN;
ssl->options.handShakeState = NULL_STATE;
ssl->options.acceptState = ACCEPT_BEGIN;
ssl->options.handShakeState = NULL_STATE;
ssl->msgsReceived.got_client_hello = 0;
ssl->keys.dtls_handshake_number = 0;
ssl->keys.dtls_expected_peer_handshake_number = 0;

View File

@ -32782,7 +32782,7 @@ static int DoSessionTicket(WOLFSSL* ssl, const byte* input, word32* inOutIdx,
* was created, timeout value and the current time. If the tickets are
* judged expired, falls back to full-handshake. If you want disable this
* session ticket validation check in TLS1.2 and below, define
* WOLFSSL_NO_TICKET_EXPRE.
* WOLFSSL_NO_TICKET_EXPIRE.
*/
int HandleTlsResumption(WOLFSSL* ssl, int bogusID, Suites* clSuites)
{
@ -33057,7 +33057,7 @@ static int DoSessionTicket(WOLFSSL* ssl, const byte* input, word32* inOutIdx,
return ret;
}
else if (pv.minor == DTLS_MINOR) {
WOLFSSL_MSG("\tDowngrading to DTLSv1.2");
WOLFSSL_MSG("\tDowngrading to DTLSv1.0");
ssl->options.tls1_3 = 0;
ssl->version.minor = DTLS_MINOR;
}