diff options
Diffstat (limited to 'lib/ext/record_size_limit.c')
-rw-r--r-- | lib/ext/record_size_limit.c | 36 |
1 files changed, 22 insertions, 14 deletions
diff --git a/lib/ext/record_size_limit.c b/lib/ext/record_size_limit.c index 9398b18882..9b14c5e97f 100644 --- a/lib/ext/record_size_limit.c +++ b/lib/ext/record_size_limit.c @@ -41,8 +41,10 @@ const hello_ext_entry_st ext_mod_record_size_limit = { .gid = GNUTLS_EXTENSION_RECORD_SIZE_LIMIT, .client_parse_point = GNUTLS_EXT_MANDATORY, .server_parse_point = GNUTLS_EXT_MANDATORY, - .validity = GNUTLS_EXT_FLAG_TLS | GNUTLS_EXT_FLAG_DTLS | GNUTLS_EXT_FLAG_CLIENT_HELLO | - GNUTLS_EXT_FLAG_EE | GNUTLS_EXT_FLAG_TLS12_SERVER_HELLO, + .validity = + GNUTLS_EXT_FLAG_TLS | GNUTLS_EXT_FLAG_DTLS | + GNUTLS_EXT_FLAG_CLIENT_HELLO | GNUTLS_EXT_FLAG_EE | + GNUTLS_EXT_FLAG_TLS12_SERVER_HELLO, .recv_func = _gnutls_record_size_limit_recv_params, .send_func = _gnutls_record_size_limit_send_params }; @@ -71,13 +73,17 @@ _gnutls_record_size_limit_recv_params(gnutls_session_t session, MIN_RECORD_SIZE_SMALL : MIN_RECORD_SIZE)) { /* for server, reject it by omitting the extension in the reply */ if (session->security_parameters.entity == GNUTLS_SERVER) { - _gnutls_handshake_log("EXT[%p]: client requested too small record_size_limit %u; ignoring\n", - session, (unsigned)new_size); + _gnutls_handshake_log + ("EXT[%p]: client requested too small record_size_limit %u; ignoring\n", + session, (unsigned)new_size); return gnutls_assert_val(0); } else { - _gnutls_handshake_log("EXT[%p]: server requested too small record_size_limit %u; closing the connection\n", - session, (unsigned)new_size); - return gnutls_assert_val(GNUTLS_E_RECEIVED_ILLEGAL_PARAMETER); + _gnutls_handshake_log + ("EXT[%p]: server requested too small record_size_limit %u; closing the connection\n", + session, (unsigned)new_size); + return + gnutls_assert_val + (GNUTLS_E_RECEIVED_ILLEGAL_PARAMETER); } } @@ -87,7 +93,7 @@ _gnutls_record_size_limit_recv_params(gnutls_session_t session, * indication of the request was accepted by the server */ if (session->security_parameters.entity == GNUTLS_CLIENT) session->security_parameters.max_record_recv_size = - session->security_parameters.max_user_record_recv_size; + session->security_parameters.max_user_record_recv_size; _gnutls_handshake_log("EXT[%p]: record_size_limit %u negotiated\n", session, (unsigned)new_size); @@ -98,8 +104,8 @@ _gnutls_record_size_limit_recv_params(gnutls_session_t session, return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR); session->security_parameters.max_record_send_size = - MIN(new_size - vers->tls13_sem, - session->security_parameters.max_user_record_send_size); + MIN(new_size - vers->tls13_sem, + session->security_parameters.max_user_record_send_size); return 0; } @@ -123,8 +129,11 @@ _gnutls_record_size_limit_send_params(gnutls_session_t session, const version_entry_st *vers; /* if we had received the extension and rejected, don't send it */ - if (session->internals.hsk_flags & HSK_RECORD_SIZE_LIMIT_RECEIVED && - !(session->internals.hsk_flags & HSK_RECORD_SIZE_LIMIT_NEGOTIATED)) + if (session-> + internals.hsk_flags & HSK_RECORD_SIZE_LIMIT_RECEIVED + && !(session-> + internals.hsk_flags & + HSK_RECORD_SIZE_LIMIT_NEGOTIATED)) return gnutls_assert_val(0); /* add 1 octet for content type */ @@ -132,8 +141,7 @@ _gnutls_record_size_limit_send_params(gnutls_session_t session, if (unlikely(vers == NULL)) return gnutls_assert_val(GNUTLS_E_INTERNAL_ERROR); - session->security_parameters.max_record_recv_size = - send_size; + session->security_parameters.max_record_recv_size = send_size; send_size += vers->tls13_sem; } else { |