Skip to content

Commit fc6d693

Browse files
committed
Update logging enter, exit, msg to match function names. Fix some typos and improper use of "enter". Fix internal uses of SSL_SUCCESS and SSL_FAILURE. Add WOLFSSL_DEBUG_NONBLOCK option to allow printing iterations without debug enabled.
1 parent da04e0f commit fc6d693

File tree

18 files changed

+314
-309
lines changed

18 files changed

+314
-309
lines changed

examples/server/server.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -273,7 +273,7 @@ static int TestEmbedSendTo(WOLFSSL* ssl, char *buf, int sz, void *ctx)
273273

274274
(void)ssl;
275275

276-
WOLFSSL_ENTER("TestEmbedSendTo()");
276+
WOLFSSL_ENTER("TestEmbedSendTo");
277277

278278
if (dtlsCtx->failOnce) {
279279
word32 seq = 0;

src/bio.c

+22-21
Original file line numberDiff line numberDiff line change
@@ -1040,7 +1040,7 @@ WOLFSSL_BIO* wolfSSL_BIO_next(WOLFSSL_BIO* bio)
10401040
/* BIO_wpending returns the number of bytes pending to be written. */
10411041
size_t wolfSSL_BIO_wpending(const WOLFSSL_BIO *bio)
10421042
{
1043-
WOLFSSL_ENTER("BIO_wpending");
1043+
WOLFSSL_ENTER("wolfSSL_BIO_wpending");
10441044

10451045
if (bio == NULL)
10461046
return 0;
@@ -1913,7 +1913,7 @@ int wolfSSL_BIO_pending(WOLFSSL_BIO* bio)
19131913

19141914
int wolfSSL_BIO_flush(WOLFSSL_BIO* bio)
19151915
{
1916-
WOLFSSL_ENTER("BIO_flush");
1916+
WOLFSSL_ENTER("wolfSSL_BIO_flush");
19171917

19181918
if (bio == NULL)
19191919
return WOLFSSL_FAILURE;
@@ -1962,7 +1962,7 @@ int wolfSSL_BIO_flush(WOLFSSL_BIO* bio)
19621962
{
19631963
static WOLFSSL_BIO_METHOD meth;
19641964

1965-
WOLFSSL_ENTER("BIO_f_buffer");
1965+
WOLFSSL_ENTER("wolfSSL_BIO_f_buffer");
19661966
meth.type = WOLFSSL_BIO_BUFFER;
19671967

19681968
return &meth;
@@ -1972,11 +1972,12 @@ int wolfSSL_BIO_flush(WOLFSSL_BIO* bio)
19721972
long wolfSSL_BIO_set_write_buffer_size(WOLFSSL_BIO* bio, long size)
19731973
{
19741974
/* wolfSSL has internal buffer, compatibility only */
1975-
WOLFSSL_ENTER("BIO_set_write_buffer_size");
1976-
WOLFSSL_MSG("Buffer resize failed");
19771975
WOLFSSL_STUB("BIO_set_write_buffer_size");
1976+
1977+
WOLFSSL_MSG("Buffer resize failed");
1978+
19781979
(void)bio;
1979-
(void) size;
1980+
(void)size;
19801981

19811982
/* Even though this is only a STUB at the moment many user applications
19821983
* may attempt to use this. OpenSSL documentation specifies the return
@@ -2038,7 +2039,7 @@ int wolfSSL_BIO_flush(WOLFSSL_BIO* bio)
20382039
{
20392040
WOLFSSL_BIO* bio = wolfSSL_BIO_new(wolfSSL_BIO_s_socket());
20402041

2041-
WOLFSSL_ENTER("BIO_new_socket");
2042+
WOLFSSL_ENTER("wolfSSL_BIO_new_socket");
20422043
if (bio) {
20432044
bio->type = WOLFSSL_BIO_SOCKET;
20442045
bio->shutdown = (byte)closeF;
@@ -2107,13 +2108,13 @@ int wolfSSL_BIO_flush(WOLFSSL_BIO* bio)
21072108
WOLFSSL_ENTER("wolfSSL_BIO_set_conn_port");
21082109

21092110
if (!b || !port) {
2110-
WOLFSSL_ENTER("Bad parameter");
2111+
WOLFSSL_MSG("Bad parameter");
21112112
return WOLFSSL_FAILURE;
21122113
}
21132114

21142115
p = XATOI(port);
21152116
if (!p || p < 0) {
2116-
WOLFSSL_ENTER("Port parsing error");
2117+
WOLFSSL_MSG("Port parsing error");
21172118
return WOLFSSL_FAILURE;
21182119
}
21192120

@@ -2141,20 +2142,20 @@ int wolfSSL_BIO_flush(WOLFSSL_BIO* bio)
21412142
WOLFSSL_ENTER("wolfSSL_BIO_do_connect");
21422143

21432144
if (!b) {
2144-
WOLFSSL_ENTER("Bad parameter");
2145+
WOLFSSL_MSG("Bad parameter");
21452146
return WOLFSSL_FAILURE;
21462147
}
21472148

21482149
while (b && b->type != WOLFSSL_BIO_SOCKET)
21492150
b = b->next;
21502151

21512152
if (!b) {
2152-
WOLFSSL_ENTER("No socket BIO in chain");
2153+
WOLFSSL_MSG("No socket BIO in chain");
21532154
return WOLFSSL_FAILURE;
21542155
}
21552156

21562157
if (wolfIO_TcpConnect(&sfd, b->ip, b->port, 0) < 0 ) {
2157-
WOLFSSL_ENTER("wolfIO_TcpConnect error");
2158+
WOLFSSL_MSG("wolfIO_TcpConnect error");
21582159
return WOLFSSL_FAILURE;
21592160
}
21602161

@@ -2178,13 +2179,13 @@ int wolfSSL_BIO_flush(WOLFSSL_BIO* bio)
21782179
b = b->next;
21792180

21802181
if (!b) {
2181-
WOLFSSL_ENTER("No socket BIO in chain");
2182+
WOLFSSL_MSG("No socket BIO in chain");
21822183
return WOLFSSL_FAILURE;
21832184
}
21842185

21852186
if (b->num == WOLFSSL_BIO_ERROR) {
21862187
if (wolfIO_TcpBind(&sfd, b->port) < 0) {
2187-
WOLFSSL_ENTER("wolfIO_TcpBind error");
2188+
WOLFSSL_MSG("wolfIO_TcpBind error");
21882189
return WOLFSSL_FAILURE;
21892190
}
21902191
b->num = (int)sfd;
@@ -2194,13 +2195,13 @@ int wolfSSL_BIO_flush(WOLFSSL_BIO* bio)
21942195
WOLFSSL_BIO* new_bio;
21952196
int newfd = wolfIO_TcpAccept(b->num, NULL, NULL);
21962197
if (newfd < 0) {
2197-
WOLFSSL_ENTER("wolfIO_TcpBind error");
2198+
WOLFSSL_MSG("wolfIO_TcpBind error");
21982199
return WOLFSSL_FAILURE;
21992200
}
22002201
/* Create a socket BIO for using the accept'ed connection */
22012202
new_bio = wolfSSL_BIO_new_socket(newfd, BIO_CLOSE);
22022203
if (new_bio == NULL) {
2203-
WOLFSSL_ENTER("wolfSSL_BIO_new_socket error");
2204+
WOLFSSL_MSG("wolfSSL_BIO_new_socket error");
22042205
CloseSocket(newfd);
22052206
return WOLFSSL_FAILURE;
22062207
}
@@ -2210,7 +2211,7 @@ int wolfSSL_BIO_flush(WOLFSSL_BIO* bio)
22102211
wolfSSL_BIO_get_callback_arg(b));
22112212
/* Push onto bio chain for user retrieval */
22122213
if (wolfSSL_BIO_push(b, new_bio) == NULL) {
2213-
WOLFSSL_ENTER("wolfSSL_BIO_push error");
2214+
WOLFSSL_MSG("wolfSSL_BIO_push error");
22142215
/* newfd is closed when bio is free'd */
22152216
wolfSSL_BIO_free(new_bio);
22162217
return WOLFSSL_FAILURE;
@@ -2225,7 +2226,7 @@ int wolfSSL_BIO_flush(WOLFSSL_BIO* bio)
22252226
int wolfSSL_BIO_eof(WOLFSSL_BIO* b)
22262227
{
22272228
int ret = 0;
2228-
WOLFSSL_ENTER("BIO_eof");
2229+
WOLFSSL_ENTER("wolfSSL_BIO_eof");
22292230

22302231
if (b == NULL)
22312232
return 1; /* Undefined in OpenSSL. Let's signal we're done. */
@@ -2683,7 +2684,7 @@ int wolfSSL_BIO_flush(WOLFSSL_BIO* bio)
26832684

26842685
void wolfSSL_BIO_free_all(WOLFSSL_BIO* bio)
26852686
{
2686-
WOLFSSL_ENTER("BIO_free_all");
2687+
WOLFSSL_ENTER("wolfSSL_BIO_free_all");
26872688
while (bio) {
26882689
WOLFSSL_BIO* next = bio->next;
26892690
wolfSSL_BIO_free(bio);
@@ -2694,7 +2695,7 @@ int wolfSSL_BIO_flush(WOLFSSL_BIO* bio)
26942695

26952696
WOLFSSL_BIO* wolfSSL_BIO_push(WOLFSSL_BIO* top, WOLFSSL_BIO* append)
26962697
{
2697-
WOLFSSL_ENTER("BIO_push");
2698+
WOLFSSL_ENTER("wolfSSL_BIO_push");
26982699
top->next = append;
26992700
append->prev = top;
27002701

@@ -3120,7 +3121,7 @@ int wolfSSL_BIO_new_bio_pair(WOLFSSL_BIO **bio1_p, size_t writebuf1,
31203121
WOLFSSL_BIO *bio1 = NULL, *bio2 = NULL;
31213122
int ret = 1;
31223123

3123-
WOLFSSL_ENTER("wolfSSL_BIO_new_bio_pair()");
3124+
WOLFSSL_ENTER("wolfSSL_BIO_new_bio_pair");
31243125

31253126
if (bio1_p == NULL || bio2_p == NULL) {
31263127
WOLFSSL_MSG("Bad Function Argument");

src/crl.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -234,7 +234,7 @@ void FreeCRL(WOLFSSL_CRL* crl, int dynamic)
234234
{
235235
int _pthread_ret = pthread_cond_destroy(&crl->cond);
236236
if (_pthread_ret != 0)
237-
WOLFSSL_MSG("pthread_cond_destroy failed in FreeCRL()");
237+
WOLFSSL_MSG("pthread_cond_destroy failed in FreeCRL");
238238
}
239239
#endif
240240
wc_FreeMutex(&crl->crlLock);

src/dtls13.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -343,7 +343,7 @@ int Dtls13ProcessBufferedMessages(WOLFSSL* ssl)
343343
word32 idx = 0;
344344
int ret = 0;
345345

346-
WOLFSSL_ENTER("Dtls13ProcessBufferedMessages()");
346+
WOLFSSL_ENTER("Dtls13ProcessBufferedMessages");
347347

348348
while (msg != NULL) {
349349
idx = 0;

0 commit comments

Comments
 (0)