finished->contentType = SSL_RecordTypeHandshake;
/* msg = type + 3 bytes len + finishedSize */
head = SSLHandshakeHeaderSize(finished);
- if ((err = SSLAllocBuffer(&finished->contents, finishedSize + head,
- ctx)) != 0)
+ if ((err = SSLAllocBuffer(&finished->contents, finishedSize + head)) != 0)
return err;
p = SSLEncodeHandshakeHeader(ctx, finished, SSL_HdskFinished, finishedSize);
return err;
/* Keep this around for secure renegotiation */
- SSLFreeBuffer(&ctx->ownVerifyData, ctx);
+ SSLFreeBuffer(&ctx->ownVerifyData);
return SSLCopyBuffer(&finishedMsg, &ctx->ownVerifyData);
}
return errSSLProtocol;
}
expectedFinished.data = 0;
- if ((err = SSLAllocBuffer(&expectedFinished, finishedSize, ctx)) != 0)
+ if ((err = SSLAllocBuffer(&expectedFinished, finishedSize)))
return err;
isServerMsg = (ctx->protocolSide == kSSLServerSide) ? false : true;
if ((err = ctx->sslTslCalls->computeFinishedMac(ctx, expectedFinished, isServerMsg)) != 0)
}
/* Keep this around for secure renegotiation */
- SSLFreeBuffer(&ctx->peerVerifyData, ctx);
+ SSLFreeBuffer(&ctx->peerVerifyData);
err = SSLCopyBuffer(&expectedFinished, &ctx->peerVerifyData);
fail:
- SSLFreeBuffer(&expectedFinished, ctx);
+ SSLFreeBuffer(&expectedFinished);
return err;
}
assert(ctx->negProtocolVersion >= SSL_Version_3_0);
helloDone->protocolVersion = ctx->negProtocolVersion;
head = SSLHandshakeHeaderSize(helloDone);
- if ((err = SSLAllocBuffer(&helloDone->contents, head, ctx)) != 0)
+ if ((err = SSLAllocBuffer(&helloDone->contents, head)))
return err;
SSLEncodeHandshakeHeader(ctx, helloDone, SSL_HdskServerHelloDone, 0); /* Message has 0 length */
- return noErr;
+ return errSecSuccess;
}
OSStatus
sslErrorLog("SSLProcessServerHelloDone: nonzero msg len\n");
return errSSLProtocol;
}
- return noErr;
+ return errSecSuccess;
}