diff options
author | David Benjamin <davidben@chromium.org> | 2014-09-06 13:09:47 -0400 |
---|---|---|
committer | Adam Langley <agl@google.com> | 2014-09-15 19:02:28 +0000 |
commit | 172fc2c42716c45ea02626ca8a31703e4dd89b33 (patch) | |
tree | 70e439b747a3ce811b39bb381f44aa4684493132 | |
parent | a70c75cfc0ca32a43985e3f24d737ca9cafcb910 (diff) | |
download | src-172fc2c42716c45ea02626ca8a31703e4dd89b33.tar.gz |
Fix some OPENSSL_PUT_ERROR calls.
Change-Id: I6a49eb5225208eed160f9bce7cb9af5145ae0df1
Reviewed-on: https://boringssl-review.googlesource.com/1754
Reviewed-by: Adam Langley <agl@google.com>
-rw-r--r-- | ssl/t1_lib.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/ssl/t1_lib.c b/ssl/t1_lib.c index b9553a5..eccf875 100644 --- a/ssl/t1_lib.c +++ b/ssl/t1_lib.c @@ -1783,7 +1783,7 @@ static int ssl_scan_clienthello_tlsext(SSL *s, CBS *cbs, int *out_alert) !(s->options & SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION)) { *out_alert = SSL_AD_HANDSHAKE_FAILURE; - OPENSSL_PUT_ERROR(SSL, ssl_add_serverhello_tlsext, SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED); + OPENSSL_PUT_ERROR(SSL, ssl_scan_clienthello_tlsext, SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED); return 0; } /* If no signature algorithms extension set default values */ @@ -2193,7 +2193,7 @@ static int ssl_check_serverhello_tlsext(SSL *s) } if (!found_uncompressed) { - OPENSSL_PUT_ERROR(SSL, ssl_add_serverhello_tlsext, SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST); + OPENSSL_PUT_ERROR(SSL, ssl_check_serverhello_tlsext, SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST); return -1; } } |