diff options
author | Matt Caswell <matt@openssl.org> | 2016-09-09 00:13:41 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2016-09-13 09:41:21 +0100 |
commit | de451856f08364ad6c6659b6eacbe820edc2aab9 (patch) | |
tree | 9906cf7b996f9c1316e800390acc96e21e20f040 /ssl/statem/statem_clnt.c | |
parent | 6ae4f5e087d204e02a5dc88ea905cca9d144a30d (diff) | |
download | openssl-de451856f08364ad6c6659b6eacbe820edc2aab9.zip openssl-de451856f08364ad6c6659b6eacbe820edc2aab9.tar.gz openssl-de451856f08364ad6c6659b6eacbe820edc2aab9.tar.bz2 |
Address WPACKET review comments
A few style tweaks here and there. The main change is that curr and
packet_len are now offsets into the buffer to account for the fact that
the pointers can change if the buffer grows. Also dropped support for the
WPACKET_set_packet_len() function. I thought that was going to be needed
but so far it hasn't been. It doesn't really work any more due to the
offsets change.
Reviewed-by: Rich Salz <rsalz@openssl.org>
Diffstat (limited to 'ssl/statem/statem_clnt.c')
-rw-r--r-- | ssl/statem/statem_clnt.c | 11 |
1 files changed, 5 insertions, 6 deletions
diff --git a/ssl/statem/statem_clnt.c b/ssl/statem/statem_clnt.c index 4f123dd..59d21df 100644 --- a/ssl/statem/statem_clnt.c +++ b/ssl/statem/statem_clnt.c @@ -794,7 +794,7 @@ int tls_construct_client_hello(SSL *s) else i = s->session->session_id_length; if (i > (int)sizeof(s->session->session_id) - || !WPACKET_start_sub_packet_len(&pkt, 1) + || !WPACKET_start_sub_packet_u8(&pkt) || (i != 0 && !WPACKET_memcpy(&pkt, s->session->session_id, i)) || !WPACKET_close(&pkt)) { SSLerr(SSL_F_TLS_CONSTRUCT_CLIENT_HELLO, ERR_R_INTERNAL_ERROR); @@ -812,7 +812,7 @@ int tls_construct_client_hello(SSL *s) } /* Ciphers supported */ - if (!WPACKET_start_sub_packet_len(&pkt, 2)) { + if (!WPACKET_start_sub_packet_u16(&pkt)) { SSLerr(SSL_F_TLS_CONSTRUCT_CLIENT_HELLO, ERR_R_INTERNAL_ERROR); goto err; } @@ -825,7 +825,7 @@ int tls_construct_client_hello(SSL *s) } /* COMPRESSION */ - if (!WPACKET_start_sub_packet_len(&pkt, 1)) { + if (!WPACKET_start_sub_packet_u8(&pkt)) { SSLerr(SSL_F_TLS_CONSTRUCT_CLIENT_HELLO, ERR_R_INTERNAL_ERROR); goto err; } @@ -852,13 +852,12 @@ int tls_construct_client_hello(SSL *s) SSLerr(SSL_F_TLS_CONSTRUCT_CLIENT_HELLO, SSL_R_CLIENTHELLO_TLSEXT); goto err; } - if (!WPACKET_start_sub_packet_len(&pkt, 2) + if (!WPACKET_start_sub_packet_u16(&pkt) /* * If extensions are of zero length then we don't even add the * extensions length bytes */ - || !WPACKET_set_flags(&pkt, - OPENSSL_WPACKET_FLAGS_ABANDON_ON_ZERO_LENGTH) + || !WPACKET_set_flags(&pkt, WPACKET_FLAGS_ABANDON_ON_ZERO_LENGTH) || !ssl_add_clienthello_tlsext(s, &pkt, &al) || !WPACKET_close(&pkt)) { ssl3_send_alert(s, SSL3_AL_FATAL, al); |