diff options
author | djm <> | 2005-04-29 05:39:33 +0000 |
---|---|---|
committer | djm <> | 2005-04-29 05:39:33 +0000 |
commit | 68edd00d9258df93b1366c71ac124e0cadf7bc08 (patch) | |
tree | 3ce4ae2a9747bbc11aed1f95f9bbea92c41f8683 /src/lib/libssl/s3_pkt.c | |
parent | f396ed0f5ce0af56bfde2e75e15cf1f52924c779 (diff) | |
download | openbsd-68edd00d9258df93b1366c71ac124e0cadf7bc08.tar.gz openbsd-68edd00d9258df93b1366c71ac124e0cadf7bc08.tar.bz2 openbsd-68edd00d9258df93b1366c71ac124e0cadf7bc08.zip |
resolve conflicts
Diffstat (limited to 'src/lib/libssl/s3_pkt.c')
-rw-r--r-- | src/lib/libssl/s3_pkt.c | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/src/lib/libssl/s3_pkt.c b/src/lib/libssl/s3_pkt.c index 9f3e5139ad..cb0b12b400 100644 --- a/src/lib/libssl/s3_pkt.c +++ b/src/lib/libssl/s3_pkt.c | |||
@@ -862,7 +862,7 @@ start: | |||
862 | { | 862 | { |
863 | al=SSL_AD_UNEXPECTED_MESSAGE; | 863 | al=SSL_AD_UNEXPECTED_MESSAGE; |
864 | SSLerr(SSL_F_SSL3_READ_BYTES,SSL_R_DATA_BETWEEN_CCS_AND_FINISHED); | 864 | SSLerr(SSL_F_SSL3_READ_BYTES,SSL_R_DATA_BETWEEN_CCS_AND_FINISHED); |
865 | goto err; | 865 | goto f_err; |
866 | } | 866 | } |
867 | 867 | ||
868 | /* If the other end has shut down, throw anything we read away | 868 | /* If the other end has shut down, throw anything we read away |
@@ -969,7 +969,7 @@ start: | |||
969 | { | 969 | { |
970 | al=SSL_AD_DECODE_ERROR; | 970 | al=SSL_AD_DECODE_ERROR; |
971 | SSLerr(SSL_F_SSL3_READ_BYTES,SSL_R_BAD_HELLO_REQUEST); | 971 | SSLerr(SSL_F_SSL3_READ_BYTES,SSL_R_BAD_HELLO_REQUEST); |
972 | goto err; | 972 | goto f_err; |
973 | } | 973 | } |
974 | 974 | ||
975 | if (s->msg_callback) | 975 | if (s->msg_callback) |
@@ -1080,17 +1080,17 @@ start: | |||
1080 | if ( (rr->length != 1) || (rr->off != 0) || | 1080 | if ( (rr->length != 1) || (rr->off != 0) || |
1081 | (rr->data[0] != SSL3_MT_CCS)) | 1081 | (rr->data[0] != SSL3_MT_CCS)) |
1082 | { | 1082 | { |
1083 | i=SSL_AD_ILLEGAL_PARAMETER; | 1083 | al=SSL_AD_ILLEGAL_PARAMETER; |
1084 | SSLerr(SSL_F_SSL3_READ_BYTES,SSL_R_BAD_CHANGE_CIPHER_SPEC); | 1084 | SSLerr(SSL_F_SSL3_READ_BYTES,SSL_R_BAD_CHANGE_CIPHER_SPEC); |
1085 | goto err; | 1085 | goto f_err; |
1086 | } | 1086 | } |
1087 | 1087 | ||
1088 | /* Check we have a cipher to change to */ | 1088 | /* Check we have a cipher to change to */ |
1089 | if (s->s3->tmp.new_cipher == NULL) | 1089 | if (s->s3->tmp.new_cipher == NULL) |
1090 | { | 1090 | { |
1091 | i=SSL_AD_UNEXPECTED_MESSAGE; | 1091 | al=SSL_AD_UNEXPECTED_MESSAGE; |
1092 | SSLerr(SSL_F_SSL3_GET_CERT_VERIFY,SSL_R_CCS_RECEIVED_EARLY); | 1092 | SSLerr(SSL_F_SSL3_GET_CERT_VERIFY,SSL_R_CCS_RECEIVED_EARLY); |
1093 | goto err; | 1093 | goto f_err; |
1094 | } | 1094 | } |
1095 | 1095 | ||
1096 | rr->length=0; | 1096 | rr->length=0; |