Correct three incorrect function names in errors. Thanks to Sean Burford. Change-Id: I4efa352f3e830c4c3761660508a1a8aa927eedf1 Reviewed-on: https://boringssl-review.googlesource.com/3841 Reviewed-by: Adam Langley <agl@google.com>
diff --git a/ssl/d1_clnt.c b/ssl/d1_clnt.c index c25b052..3c3e0b4 100644 --- a/ssl/d1_clnt.c +++ b/ssl/d1_clnt.c
@@ -551,7 +551,7 @@ !CBS_get_u8_length_prefixed(&hello_verify_request, &cookie) || CBS_len(&hello_verify_request) != 0) { al = SSL_AD_DECODE_ERROR; - OPENSSL_PUT_ERROR(SSL, ssl3_get_cert_status, SSL_R_DECODE_ERROR); + OPENSSL_PUT_ERROR(SSL, dtls1_get_hello_verify, SSL_R_DECODE_ERROR); goto f_err; }
diff --git a/ssl/d1_pkt.c b/ssl/d1_pkt.c index 0cb0ba4..ba218f5 100644 --- a/ssl/d1_pkt.c +++ b/ssl/d1_pkt.c
@@ -729,7 +729,7 @@ /* Alerts may not be fragmented. */ if (rr->length < 2) { al = SSL_AD_DECODE_ERROR; - OPENSSL_PUT_ERROR(SSL, ssl3_read_bytes, SSL_R_BAD_ALERT); + OPENSSL_PUT_ERROR(SSL, dtls1_read_bytes, SSL_R_BAD_ALERT); goto f_err; } @@ -828,7 +828,7 @@ if (rr->type == SSL3_RT_HANDSHAKE && !s->in_handshake) { if (rr->length < DTLS1_HM_HEADER_LENGTH) { al = SSL_AD_DECODE_ERROR; - OPENSSL_PUT_ERROR(SSL, ssl3_read_bytes, SSL_R_BAD_HANDSHAKE_RECORD); + OPENSSL_PUT_ERROR(SSL, dtls1_read_bytes, SSL_R_BAD_HANDSHAKE_RECORD); goto f_err; } struct hm_header_st msg_hdr;