summaryrefslogtreecommitdiff
path: root/lib/ext/record_size_limit.c
diff options
context:
space:
mode:
Diffstat (limited to 'lib/ext/record_size_limit.c')
-rw-r--r--lib/ext/record_size_limit.c36
1 files changed, 22 insertions, 14 deletions
diff --git a/lib/ext/record_size_limit.c b/lib/ext/record_size_limit.c
index 9398b18882..9b14c5e97f 100644
--- a/lib/ext/record_size_limit.c
+++ b/lib/ext/record_size_limit.c
@@ -41,8 +41,10 @@ const hello_ext_entry_st ext_mod_record_size_limit = {
.gid = GNUTLS_EXTENSION_RECORD_SIZE_LIMIT,
.client_parse_point = GNUTLS_EXT_MANDATORY,
.server_parse_point = GNUTLS_EXT_MANDATORY,
- .validity = GNUTLS_EXT_FLAG_TLS | GNUTLS_EXT_FLAG_DTLS | GNUTLS_EXT_FLAG_CLIENT_HELLO |
- GNUTLS_EXT_FLAG_EE | GNUTLS_EXT_FLAG_TLS12_SERVER_HELLO,
+ .validity =
+ GNUTLS_EXT_FLAG_TLS | GNUTLS_EXT_FLAG_DTLS |
+ GNUTLS_EXT_FLAG_CLIENT_HELLO | GNUTLS_EXT_FLAG_EE |
+ GNUTLS_EXT_FLAG_TLS12_SERVER_HELLO,
.recv_func = _gnutls_record_size_limit_recv_params,
.send_func = _gnutls_record_size_limit_send_params
};
@@ -71,13 +73,17 @@ _gnutls_record_size_limit_recv_params(gnutls_session_t session,
MIN_RECORD_SIZE_SMALL : MIN_RECORD_SIZE)) {
/* for server, reject it by omitting the extension in the reply */
if (session->security_parameters.entity == GNUTLS_SERVER) {
- _gnutls_handshake_log("EXT[%p]: client requested too small record_size_limit %u; ignoring\n",
- session, (unsigned)new_size);
+ _gnutls_handshake_log
+ ("EXT[%p]: client requested too small record_size_limit %u; ignoring\n",
+ session, (unsigned)new_size);
return gnutls_assert_val(0);
} else {
- _gnutls_handshake_log("EXT[%p]: server requested too small record_size_limit %u; closing the connection\n",
- session, (unsigned)new_size);
- return gnutls_assert_val(GNUTLS_E_RECEIVED_ILLEGAL_PARAMETER);
+ _gnutls_handshake_log
+ ("EXT[%p]: server requested too small record_size_limit %u; closing the connection\n",
+ session, (unsigned)new_size);
+ return
+ gnutls_assert_val
+ (GNUTLS_E_RECEIVED_ILLEGAL_PARAMETER);
}
}
@@ -87,7 +93,7 @@ _gnutls_record_size_limit_recv_params(gnutls_session_t session,
* indication of the request was accepted by the server */
if (session->security_parameters.entity == GNUTLS_CLIENT)
session->security_parameters.max_record_recv_size =
- session->security_parameters.max_user_record_recv_size;
+ session->security_parameters.max_user_record_recv_size;
_gnutls_handshake_log("EXT[%p]: record_size_limit %u negotiated\n",
session, (unsigned)new_size);
@@ -98,8 +104,8 @@ _gnutls_record_size_limit_recv_params(gnutls_session_t session,
return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR);
session->security_parameters.max_record_send_size =
- MIN(new_size - vers->tls13_sem,
- session->security_parameters.max_user_record_send_size);
+ MIN(new_size - vers->tls13_sem,
+ session->security_parameters.max_user_record_send_size);
return 0;
}
@@ -123,8 +129,11 @@ _gnutls_record_size_limit_send_params(gnutls_session_t session,
const version_entry_st *vers;
/* if we had received the extension and rejected, don't send it */
- if (session->internals.hsk_flags & HSK_RECORD_SIZE_LIMIT_RECEIVED &&
- !(session->internals.hsk_flags & HSK_RECORD_SIZE_LIMIT_NEGOTIATED))
+ if (session->
+ internals.hsk_flags & HSK_RECORD_SIZE_LIMIT_RECEIVED
+ && !(session->
+ internals.hsk_flags &
+ HSK_RECORD_SIZE_LIMIT_NEGOTIATED))
return gnutls_assert_val(0);
/* add 1 octet for content type */
@@ -132,8 +141,7 @@ _gnutls_record_size_limit_send_params(gnutls_session_t session,
if (unlikely(vers == NULL))
return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR);
- session->security_parameters.max_record_recv_size =
- send_size;
+ session->security_parameters.max_record_recv_size = send_size;
send_size += vers->tls13_sem;
} else {