diff options
Diffstat (limited to 'src/lib/libssl/tls13_legacy.c')
| -rw-r--r-- | src/lib/libssl/tls13_legacy.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/src/lib/libssl/tls13_legacy.c b/src/lib/libssl/tls13_legacy.c index 81a317d4a5..8aa806aa45 100644 --- a/src/lib/libssl/tls13_legacy.c +++ b/src/lib/libssl/tls13_legacy.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: tls13_legacy.c,v 1.19 2020/11/03 17:41:39 jsing Exp $ */ | 1 | /* $OpenBSD: tls13_legacy.c,v 1.20 2021/01/04 19:19:12 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> |
| 4 | * | 4 | * |
| @@ -216,7 +216,7 @@ tls13_legacy_read_bytes(SSL *ssl, int type, unsigned char *buf, int len, int pee | |||
| 216 | return -1; | 216 | return -1; |
| 217 | } | 217 | } |
| 218 | if (len < 0) { | 218 | if (len < 0) { |
| 219 | SSLerror(ssl, SSL_R_BAD_LENGTH); | 219 | SSLerror(ssl, SSL_R_BAD_LENGTH); |
| 220 | return -1; | 220 | return -1; |
| 221 | } | 221 | } |
| 222 | 222 | ||
| @@ -247,7 +247,7 @@ tls13_legacy_write_bytes(SSL *ssl, int type, const void *vbuf, int len) | |||
| 247 | return -1; | 247 | return -1; |
| 248 | } | 248 | } |
| 249 | if (len < 0) { | 249 | if (len < 0) { |
| 250 | SSLerror(ssl, SSL_R_BAD_LENGTH); | 250 | SSLerror(ssl, SSL_R_BAD_LENGTH); |
| 251 | return -1; | 251 | return -1; |
| 252 | } | 252 | } |
| 253 | 253 | ||
| @@ -261,12 +261,12 @@ tls13_legacy_write_bytes(SSL *ssl, int type, const void *vbuf, int len) | |||
| 261 | } | 261 | } |
| 262 | 262 | ||
| 263 | /* | 263 | /* |
| 264 | * In the non-SSL_MODE_ENABLE_PARTIAL_WRITE case we have to loop until | 264 | * In the non-SSL_MODE_ENABLE_PARTIAL_WRITE case we have to loop until |
| 265 | * we have written out all of the requested data. | 265 | * we have written out all of the requested data. |
| 266 | */ | 266 | */ |
| 267 | sent = S3I(ssl)->wnum; | 267 | sent = S3I(ssl)->wnum; |
| 268 | if (len < sent) { | 268 | if (len < sent) { |
| 269 | SSLerror(ssl, SSL_R_BAD_LENGTH); | 269 | SSLerror(ssl, SSL_R_BAD_LENGTH); |
| 270 | return -1; | 270 | return -1; |
| 271 | } | 271 | } |
| 272 | n = len - sent; | 272 | n = len - sent; |
