/*
* Perform miscellaneous checks and processing after we have received the
* server's initial flight. In TLS1.3 this is after the Server Finished message.
- * In <=TLS1.2 this is after the ServerDone message.
- *
- * Returns 1 on success or 0 on failure.
+ * In <=TLS1.2 this is after the ServerDone message. Returns 1 on success or 0
+ * on failure.
*/
int tls_process_initial_server_flight(SSL *s, int *al)
{
size_t ivlen, keylen, finsecretlen;
const unsigned char *label;
size_t labellen;
+ int ret = 0;
if (which & SSL3_CC_READ) {
if (s->enc_read_ctx != NULL) {
}
#endif
- OPENSSL_cleanse(secret, sizeof(secret));
- OPENSSL_cleanse(key, sizeof(key));
- OPENSSL_cleanse(iv, sizeof(iv));
- return 1;
+ ret = 1;
err:
OPENSSL_cleanse(secret, sizeof(secret));
OPENSSL_cleanse(key, sizeof(key));
OPENSSL_cleanse(iv, sizeof(iv));
- return 0;
+ return ret;
}
testresult = 0;
ctx = SSL_CTX_new(TLS_method());
- /*
- * This test is testing session tickets for <= TLS1.2. It isn't relevant
- * for TLS1.3
- */
+ /* Testing for session tickets <= TLS1.2; not relevant for 1.3 */
if (ctx == NULL || !SSL_CTX_set_max_proto_version(ctx, TLS1_2_VERSION))
goto end;