Commit 9f6c4ad8 authored by Sergey Petrunya's avatar Sergey Petrunya

Post-merge fixes

parent 151e5d58
...@@ -789,7 +789,7 @@ void processReply(SSL& ssl) ...@@ -789,7 +789,7 @@ void processReply(SSL& ssl)
{ {
if (ssl.GetError()) return; if (ssl.GetError()) return;
if (DoProcessReply(ssl)) { if (DoProcessReply(ssl))
{ {
// didn't complete process // didn't complete process
if (!ssl.getSocket().IsNonBlocking()) { if (!ssl.getSocket().IsNonBlocking()) {
...@@ -874,7 +874,7 @@ void sendServerKeyExchange(SSL& ssl, BufferOutput buffer) ...@@ -874,7 +874,7 @@ void sendServerKeyExchange(SSL& ssl, BufferOutput buffer)
// send change cipher // send change cipher
void sendChangeCipher(SSL& ssl, BufferOutput buffer) void sendChangeCipher(SSL& ssl, BufferOutput buffer)
{ {
if (ssl.getSecurity().get_parms().entity_ == server_end) { if (ssl.getSecurity().get_parms().entity_ == server_end)
{ {
if (ssl.getSecurity().get_resuming()) if (ssl.getSecurity().get_resuming())
ssl.verifyState(clientKeyExchangeComplete); ssl.verifyState(clientKeyExchangeComplete);
......
...@@ -1305,7 +1305,6 @@ void ServerHello::Process(input_buffer&, SSL& ssl) ...@@ -1305,7 +1305,6 @@ void ServerHello::Process(input_buffer&, SSL& ssl)
ssl.useSecurity().use_connection().sessionID_Set_ = false; ssl.useSecurity().use_connection().sessionID_Set_ = false;
if (ssl.getSecurity().get_resuming()) { if (ssl.getSecurity().get_resuming()) {
{
if (memcmp(session_id_, ssl.getSecurity().get_resume().GetID(), if (memcmp(session_id_, ssl.getSecurity().get_resume().GetID(),
ID_LEN) == 0) { ID_LEN) == 0) {
ssl.set_masterSecret(ssl.getSecurity().get_resume().GetSecret()); ssl.set_masterSecret(ssl.getSecurity().get_resume().GetSecret());
......
...@@ -95,7 +95,7 @@ inline void Mode_BASE::Process(byte* out, const byte* in, word32 sz) ...@@ -95,7 +95,7 @@ inline void Mode_BASE::Process(byte* out, const byte* in, word32 sz)
{ {
if (mode_ == ECB) if (mode_ == ECB)
ECB_Process(out, in, sz); ECB_Process(out, in, sz);
else if (mode_ == CBC) { else if (mode_ == CBC)
{ {
if (dir_ == ENCRYPTION) if (dir_ == ENCRYPTION)
CBC_Encrypt(out, in, sz); CBC_Encrypt(out, in, sz);
......
...@@ -1063,7 +1063,7 @@ word32 DecodeDSA_Signature(byte* decoded, const byte* encoded, word32 sz) ...@@ -1063,7 +1063,7 @@ word32 DecodeDSA_Signature(byte* decoded, const byte* encoded, word32 sz)
return 0; return 0;
} }
word32 rLen = GetLength(source); word32 rLen = GetLength(source);
if (rLen != 20) { if (rLen != 20)
{ {
if (rLen == 21) { // zero at front, eat if (rLen == 21) { // zero at front, eat
source.next(); source.next();
...@@ -1087,7 +1087,7 @@ word32 DecodeDSA_Signature(byte* decoded, const byte* encoded, word32 sz) ...@@ -1087,7 +1087,7 @@ word32 DecodeDSA_Signature(byte* decoded, const byte* encoded, word32 sz)
return 0; return 0;
} }
word32 sLen = GetLength(source); word32 sLen = GetLength(source);
if (sLen != 20) { if (sLen != 20)
{ {
if (sLen == 21) { if (sLen == 21) {
source.next(); // zero at front, eat source.next(); // zero at front, eat
......
...@@ -1136,8 +1136,6 @@ my_bool maria_rtree_real_delete(MARIA_HA *info, MARIA_KEY *key, ...@@ -1136,8 +1136,6 @@ my_bool maria_rtree_real_delete(MARIA_HA *info, MARIA_KEY *key,
uchar *page_buf; uchar *page_buf;
MARIA_PAGE page; MARIA_PAGE page;
MARIA_KEY tmp_key; MARIA_KEY tmp_key;
uchar *page_buf;
MARIA_PAGE page;
tmp_key.keyinfo= key->keyinfo; tmp_key.keyinfo= key->keyinfo;
tmp_key.data_length= key->data_length; tmp_key.data_length= key->data_length;
tmp_key.ref_length= key->ref_length; tmp_key.ref_length= key->ref_length;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment