Make ssl_parse_serverhello_use_srtp_ext return 0 on failure. Match most other functions. 03973096f416e694b676160ca481553bb44738eb changed the call site, but not the function itself. Change-Id: Iac018cbed8a454f50fb0da5e2419f503d8cb652d Reviewed-on: https://boringssl-review.googlesource.com/1060 Reviewed-by: Adam Langley <agl@google.com>
diff --git a/ssl/d1_srtp.c b/ssl/d1_srtp.c index c27d766..fb5d1e7 100644 --- a/ssl/d1_srtp.c +++ b/ssl/d1_srtp.c
@@ -453,7 +453,7 @@ { OPENSSL_PUT_ERROR(SSL, ssl_parse_serverhello_use_srtp_ext, SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST); *out_alert = SSL_AD_DECODE_ERROR; - return 1; + return 0; } if (CBS_len(&srtp_mki) != 0) @@ -461,7 +461,7 @@ /* Must be no MKI, since we never offer one. */ OPENSSL_PUT_ERROR(SSL, ssl_parse_serverhello_use_srtp_ext, SSL_R_BAD_SRTP_MKI_VALUE); *out_alert = SSL_AD_ILLEGAL_PARAMETER; - return 1; + return 0; } clnt=SSL_get_srtp_profiles(s); @@ -471,7 +471,7 @@ { OPENSSL_PUT_ERROR(SSL, ssl_parse_serverhello_use_srtp_ext, SSL_R_NO_SRTP_PROFILES); *out_alert = SSL_AD_DECODE_ERROR; - return 1; + return 0; } /* Check to see if the server gave us something we support @@ -485,13 +485,13 @@ { s->srtp_profile=prof; *out_alert = 0; - return 0; + return 1; } } OPENSSL_PUT_ERROR(SSL, ssl_parse_serverhello_use_srtp_ext, SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST); *out_alert = SSL_AD_ILLEGAL_PARAMETER; - return 1; + return 0; }