aboutsummaryrefslogtreecommitdiff
path: root/ssl/statem/statem_clnt.c
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2016-09-09 00:13:41 +0100
committerMatt Caswell <matt@openssl.org>2016-09-13 09:41:21 +0100
commitde451856f08364ad6c6659b6eacbe820edc2aab9 (patch)
tree9906cf7b996f9c1316e800390acc96e21e20f040 /ssl/statem/statem_clnt.c
parent6ae4f5e087d204e02a5dc88ea905cca9d144a30d (diff)
downloadopenssl-de451856f08364ad6c6659b6eacbe820edc2aab9.zip
openssl-de451856f08364ad6c6659b6eacbe820edc2aab9.tar.gz
openssl-de451856f08364ad6c6659b6eacbe820edc2aab9.tar.bz2
Address WPACKET review comments
A few style tweaks here and there. The main change is that curr and packet_len are now offsets into the buffer to account for the fact that the pointers can change if the buffer grows. Also dropped support for the WPACKET_set_packet_len() function. I thought that was going to be needed but so far it hasn't been. It doesn't really work any more due to the offsets change. Reviewed-by: Rich Salz <rsalz@openssl.org>
Diffstat (limited to 'ssl/statem/statem_clnt.c')
-rw-r--r--ssl/statem/statem_clnt.c11
1 files changed, 5 insertions, 6 deletions
diff --git a/ssl/statem/statem_clnt.c b/ssl/statem/statem_clnt.c
index 4f123dd..59d21df 100644
--- a/ssl/statem/statem_clnt.c
+++ b/ssl/statem/statem_clnt.c
@@ -794,7 +794,7 @@ int tls_construct_client_hello(SSL *s)
else
i = s->session->session_id_length;
if (i > (int)sizeof(s->session->session_id)
- || !WPACKET_start_sub_packet_len(&pkt, 1)
+ || !WPACKET_start_sub_packet_u8(&pkt)
|| (i != 0 && !WPACKET_memcpy(&pkt, s->session->session_id, i))
|| !WPACKET_close(&pkt)) {
SSLerr(SSL_F_TLS_CONSTRUCT_CLIENT_HELLO, ERR_R_INTERNAL_ERROR);
@@ -812,7 +812,7 @@ int tls_construct_client_hello(SSL *s)
}
/* Ciphers supported */
- if (!WPACKET_start_sub_packet_len(&pkt, 2)) {
+ if (!WPACKET_start_sub_packet_u16(&pkt)) {
SSLerr(SSL_F_TLS_CONSTRUCT_CLIENT_HELLO, ERR_R_INTERNAL_ERROR);
goto err;
}
@@ -825,7 +825,7 @@ int tls_construct_client_hello(SSL *s)
}
/* COMPRESSION */
- if (!WPACKET_start_sub_packet_len(&pkt, 1)) {
+ if (!WPACKET_start_sub_packet_u8(&pkt)) {
SSLerr(SSL_F_TLS_CONSTRUCT_CLIENT_HELLO, ERR_R_INTERNAL_ERROR);
goto err;
}
@@ -852,13 +852,12 @@ int tls_construct_client_hello(SSL *s)
SSLerr(SSL_F_TLS_CONSTRUCT_CLIENT_HELLO, SSL_R_CLIENTHELLO_TLSEXT);
goto err;
}
- if (!WPACKET_start_sub_packet_len(&pkt, 2)
+ if (!WPACKET_start_sub_packet_u16(&pkt)
/*
* If extensions are of zero length then we don't even add the
* extensions length bytes
*/
- || !WPACKET_set_flags(&pkt,
- OPENSSL_WPACKET_FLAGS_ABANDON_ON_ZERO_LENGTH)
+ || !WPACKET_set_flags(&pkt, WPACKET_FLAGS_ABANDON_ON_ZERO_LENGTH)
|| !ssl_add_clienthello_tlsext(s, &pkt, &al)
|| !WPACKET_close(&pkt)) {
ssl3_send_alert(s, SSL3_AL_FATAL, al);