mirror of
https://github.com/openssl/openssl.git
synced 2025-02-17 14:32:04 +08:00
ssl: replace tabs with spaces
Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15824)
This commit is contained in:
parent
e69bde88e4
commit
5ea4d7648c
@ -225,7 +225,7 @@ int ktls_configure_crypto(const SSL *s, const EVP_CIPHER *c, EVP_CIPHER_CTX *dd,
|
||||
crypto_info->chacha20poly1305.info.version = s->version;
|
||||
crypto_info->tls_crypto_info_len = sizeof(crypto_info->chacha20poly1305);
|
||||
memcpy(crypto_info->chacha20poly1305.iv, iiv,
|
||||
TLS_CIPHER_CHACHA20_POLY1305_IV_SIZE);
|
||||
TLS_CIPHER_CHACHA20_POLY1305_IV_SIZE);
|
||||
memcpy(crypto_info->chacha20poly1305.key, key,
|
||||
EVP_CIPHER_get_key_length(c));
|
||||
memcpy(crypto_info->chacha20poly1305.rec_seq, rl_sequence,
|
||||
|
@ -1203,13 +1203,13 @@ int ssl3_write_pending(SSL *s, int type, const unsigned char *buf, size_t len,
|
||||
i = -1;
|
||||
}
|
||||
|
||||
/*
|
||||
* When an empty fragment is sent on a connection using KTLS,
|
||||
* it is sent as a write of zero bytes. If this zero byte
|
||||
* write succeeds, i will be 0 rather than a non-zero value.
|
||||
* Treat i == 0 as success rather than an error for zero byte
|
||||
* writes to permit this case.
|
||||
*/
|
||||
/*
|
||||
* When an empty fragment is sent on a connection using KTLS,
|
||||
* it is sent as a write of zero bytes. If this zero byte
|
||||
* write succeeds, i will be 0 rather than a non-zero value.
|
||||
* Treat i == 0 as success rather than an error for zero byte
|
||||
* writes to permit this case.
|
||||
*/
|
||||
if (i >= 0 && tmpwrit == SSL3_BUFFER_get_left(&wb[currbuf])) {
|
||||
SSL3_BUFFER_set_left(&wb[currbuf], 0);
|
||||
SSL3_BUFFER_add_offset(&wb[currbuf], tmpwrit);
|
||||
|
@ -953,7 +953,7 @@ static int final_server_name(SSL *s, unsigned int context, int sent)
|
||||
* exceed sess_accept (zero) for the new context.
|
||||
*/
|
||||
if (SSL_IS_FIRST_HANDSHAKE(s) && s->ctx != s->session_ctx
|
||||
&& s->hello_retry_request == SSL_HRR_NONE) {
|
||||
&& s->hello_retry_request == SSL_HRR_NONE) {
|
||||
tsan_counter(&s->ctx->stats.sess_accept);
|
||||
tsan_decr(&s->session_ctx->stats.sess_accept);
|
||||
}
|
||||
|
@ -1431,7 +1431,7 @@ static int sigalg_security_bits(SSL_CTX *ctx, const SIGALG_LOOKUP *lu)
|
||||
* SHA1 at 2^63.4 and MD5+SHA1 at 2^67.2
|
||||
* https://documents.epfl.ch/users/l/le/lenstra/public/papers/lat.pdf
|
||||
* puts a chosen-prefix attack for MD5 at 2^39.
|
||||
*/
|
||||
*/
|
||||
if (md_type == NID_sha1)
|
||||
secbits = 64;
|
||||
else if (md_type == NID_md5_sha1)
|
||||
|
Loading…
Reference in New Issue
Block a user