diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2002-08-29 12:58:39 +0000 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2002-08-29 12:58:39 +0000 |
commit | 5cb018a2c17e92dfb50e5bc1c03ccc080f6be87b (patch) | |
tree | 61f4f6ab841f1656b6c46205cc063befdaac7dc8 /lib/ext_max_record.c | |
parent | 38c90cd3ff90327d5767b192be1a940ca22af406 (diff) | |
download | gnutls-5cb018a2c17e92dfb50e5bc1c03ccc080f6be87b.tar.gz |
Renamed all the constructed types to have more consisten names, and some other minor improvements.
Diffstat (limited to 'lib/ext_max_record.c')
-rw-r--r-- | lib/ext_max_record.c | 26 |
1 files changed, 13 insertions, 13 deletions
diff --git a/lib/ext_max_record.c b/lib/ext_max_record.c index 6dbe74b7bf..bf5371e74a 100644 --- a/lib/ext_max_record.c +++ b/lib/ext_max_record.c @@ -29,7 +29,7 @@ /* * In case of a server: if a MAX_RECORD_SIZE extension type is received then it stores - * into the state the new value. The server may use gnutls_get_max_record_size(), + * into the session the new value. The server may use gnutls_get_max_record_size(), * in order to access it. * * In case of a client: If a different max record size (than the default) has @@ -37,10 +37,10 @@ * */ -int _gnutls_max_record_recv_params( GNUTLS_STATE state, const opaque* data, int data_size) { +int _gnutls_max_record_recv_params( gnutls_session session, const opaque* data, int data_size) { size_t new_size; - if (state->security_parameters.entity == GNUTLS_SERVER) { + if (session->security_parameters.entity == GNUTLS_SERVER) { if (data_size > 0) { if ( data_size != 1) { gnutls_assert(); @@ -54,8 +54,8 @@ int _gnutls_max_record_recv_params( GNUTLS_STATE state, const opaque* data, int return new_size; } - state->security_parameters.max_record_send_size = new_size; - state->security_parameters.max_record_recv_size = new_size; + session->security_parameters.max_record_send_size = new_size; + session->security_parameters.max_record_recv_size = new_size; } } else { /* CLIENT SIDE - we must check if the sent record size is the right one */ @@ -68,11 +68,11 @@ int _gnutls_max_record_recv_params( GNUTLS_STATE state, const opaque* data, int new_size = _gnutls_mre_num2record(data[0]); - if (new_size < 0 || new_size != state->gnutls_internals.proposed_record_size) { + if (new_size < 0 || new_size != session->internals.proposed_record_size) { gnutls_assert(); return GNUTLS_E_ILLEGAL_PARAMETER; } else { - state->security_parameters.max_record_recv_size = state->gnutls_internals.proposed_record_size; + session->security_parameters.max_record_recv_size = session->internals.proposed_record_size; } } @@ -86,12 +86,12 @@ int _gnutls_max_record_recv_params( GNUTLS_STATE state, const opaque* data, int /* returns data_size or a negative number on failure * data is allocated localy */ -int _gnutls_max_record_send_params( GNUTLS_STATE state, opaque* data, int data_size) { +int _gnutls_max_record_send_params( gnutls_session session, opaque* data, int data_size) { uint16 len; /* this function sends the client extension data (dnsname) */ - if (state->security_parameters.entity == GNUTLS_CLIENT) { + if (session->security_parameters.entity == GNUTLS_CLIENT) { - if (state->gnutls_internals.proposed_record_size != DEFAULT_MAX_RECORD_SIZE) { + if (session->internals.proposed_record_size != DEFAULT_MAX_RECORD_SIZE) { gnutls_assert(); len = 1; @@ -100,20 +100,20 @@ int _gnutls_max_record_send_params( GNUTLS_STATE state, opaque* data, int data_s return GNUTLS_E_INVALID_REQUEST; } - data[0] = _gnutls_mre_record2num( state->gnutls_internals.proposed_record_size); + data[0] = _gnutls_mre_record2num( session->internals.proposed_record_size); return len; } } else { /* server side */ - if (state->security_parameters.max_record_recv_size != DEFAULT_MAX_RECORD_SIZE) { + if (session->security_parameters.max_record_recv_size != DEFAULT_MAX_RECORD_SIZE) { len = 1; if (data_size < len) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } - data[0] = _gnutls_mre_record2num( state->security_parameters.max_record_recv_size); + data[0] = _gnutls_mre_record2num( session->security_parameters.max_record_recv_size); return len; } |