diff --git a/src/dtls.c b/src/dtls.c index 79277b152..9dcedba05 100644 --- a/src/dtls.c +++ b/src/dtls.c @@ -36,7 +36,7 @@ #ifdef WOLFSSL_DTLS -void DtlsResetState(WOLFSSL *ssl) +void DtlsResetState(WOLFSSL* ssl) { /* Reset the state so that we can statelessly await the * ClientHello that contains the cookie. Don't gate on IsAtLeastTLSv1_3 @@ -52,7 +52,7 @@ void DtlsResetState(WOLFSSL *ssl) w64Zero(&ssl->dtls13Epochs[0].nextSeqNumber); w64Zero(&ssl->dtls13Epochs[0].nextPeerSeqNumber); XMEMSET(ssl->dtls13Epochs[0].window, 0, - sizeof(ssl->dtls13Epochs[0].window)); + sizeof(ssl->dtls13Epochs[0].window)); Dtls13FreeFsmResources(ssl); #endif ssl->keys.dtls_expected_peer_handshake_number = 0; @@ -62,8 +62,8 @@ void DtlsResetState(WOLFSSL *ssl) ssl->options.serverState = NULL_STATE; ssl->options.clientState = NULL_STATE; ssl->options.connectState = CONNECT_BEGIN; - ssl->options.acceptState = ACCEPT_BEGIN; - ssl->options.handShakeState = NULL_STATE; + ssl->options.acceptState = ACCEPT_BEGIN; + ssl->options.handShakeState = NULL_STATE; ssl->msgsReceived.got_client_hello = 0; ssl->keys.dtls_handshake_number = 0; ssl->keys.dtls_expected_peer_handshake_number = 0; diff --git a/src/internal.c b/src/internal.c index 67c6ae7d3..99dedcb51 100644 --- a/src/internal.c +++ b/src/internal.c @@ -32782,7 +32782,7 @@ static int DoSessionTicket(WOLFSSL* ssl, const byte* input, word32* inOutIdx, * was created, timeout value and the current time. If the tickets are * judged expired, falls back to full-handshake. If you want disable this * session ticket validation check in TLS1.2 and below, define - * WOLFSSL_NO_TICKET_EXPRE. + * WOLFSSL_NO_TICKET_EXPIRE. */ int HandleTlsResumption(WOLFSSL* ssl, int bogusID, Suites* clSuites) { @@ -33057,7 +33057,7 @@ static int DoSessionTicket(WOLFSSL* ssl, const byte* input, word32* inOutIdx, return ret; } else if (pv.minor == DTLS_MINOR) { - WOLFSSL_MSG("\tDowngrading to DTLSv1.2"); + WOLFSSL_MSG("\tDowngrading to DTLSv1.0"); ssl->options.tls1_3 = 0; ssl->version.minor = DTLS_MINOR; }