diff options
author | 2021-02-20 14:14:16 +0000 | |
---|---|---|
committer | 2021-02-20 14:14:16 +0000 | |
commit | ba06b73eb7dffead0e0f080192be9f605471bd3f (patch) | |
tree | f4f92b9b4694ac23287ad705e08e3109c15783f0 /lib/libssl/d1_both.c | |
parent | Rename the truncated label into decode_err. This describes its purpose (diff) | |
download | wireguard-openbsd-ba06b73eb7dffead0e0f080192be9f605471bd3f.tar.xz wireguard-openbsd-ba06b73eb7dffead0e0f080192be9f605471bd3f.zip |
Rename f_err into fatal_err.
discussed with jsing
Diffstat (limited to 'lib/libssl/d1_both.c')
-rw-r--r-- | lib/libssl/d1_both.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/lib/libssl/d1_both.c b/lib/libssl/d1_both.c index ba4e9edd8d1..06a8585e10f 100644 --- a/lib/libssl/d1_both.c +++ b/lib/libssl/d1_both.c @@ -1,4 +1,4 @@ -/* $OpenBSD: d1_both.c,v 1.66 2021/01/26 14:22:19 jsing Exp $ */ +/* $OpenBSD: d1_both.c,v 1.67 2021/02/20 14:14:16 tb Exp $ */ /* * DTLS implementation written by Nagendra Modadugu * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. @@ -391,7 +391,7 @@ dtls1_get_message(SSL *s, int st1, int stn, int mt, long max, int *ok) if ((mt >= 0) && (S3I(s)->tmp.message_type != mt)) { al = SSL_AD_UNEXPECTED_MESSAGE; SSLerror(s, SSL_R_UNEXPECTED_MESSAGE); - goto f_err; + goto fatal_err; } *ok = 1; s->internal->init_msg = s->internal->init_buf->data + DTLS1_HM_HEADER_LENGTH; @@ -433,7 +433,7 @@ again: s->internal->init_msg = s->internal->init_buf->data + DTLS1_HM_HEADER_LENGTH; return s->internal->init_num; -f_err: + fatal_err: ssl3_send_alert(s, SSL3_AL_FATAL, al); *ok = 0; return -1; @@ -776,7 +776,7 @@ again: dtls1_get_message_header(wire, &msg_hdr) == 0) { al = SSL_AD_UNEXPECTED_MESSAGE; SSLerror(s, SSL_R_UNEXPECTED_MESSAGE); - goto f_err; + goto fatal_err; } /* @@ -818,12 +818,12 @@ again: { al = SSL_AD_UNEXPECTED_MESSAGE; SSLerror(s, SSL_R_UNEXPECTED_MESSAGE); - goto f_err; + goto fatal_err; } } if ((al = dtls1_preprocess_fragment(s, &msg_hdr, max))) - goto f_err; + goto fatal_err; /* XDTLS: ressurect this when restart is in place */ S3I(s)->hs.state = stn; @@ -849,7 +849,7 @@ again: if (i != (int)frag_len) { al = SSL3_AD_ILLEGAL_PARAMETER; SSLerror(s, SSL3_AD_ILLEGAL_PARAMETER); - goto f_err; + goto fatal_err; } *ok = 1; @@ -863,7 +863,7 @@ again: s->internal->init_num = frag_len; return frag_len; -f_err: + fatal_err: ssl3_send_alert(s, SSL3_AL_FATAL, al); s->internal->init_num = 0; |