@@ -515,7 +515,7 @@ int wolfSSH_accept(WOLFSSH* ssh)
515515 }
516516 ssh -> acceptState = ACCEPT_SERVER_VERSION_SENT ;
517517 WLOG (WS_LOG_DEBUG , acceptState , "SERVER_VERSION_SENT" );
518- NO_BREAK ;
518+ FALL_THROUGH ;
519519
520520 case ACCEPT_SERVER_VERSION_SENT :
521521 while (ssh -> clientState < CLIENT_VERSION_DONE ) {
@@ -527,7 +527,7 @@ int wolfSSH_accept(WOLFSSH* ssh)
527527 }
528528 ssh -> acceptState = ACCEPT_CLIENT_VERSION_DONE ;
529529 WLOG (WS_LOG_DEBUG , acceptState , "CLIENT_VERSION_DONE" );
530- NO_BREAK ;
530+ FALL_THROUGH ;
531531
532532 case ACCEPT_CLIENT_VERSION_DONE :
533533 if ( (ssh -> error = SendKexInit (ssh )) < WS_SUCCESS ) {
@@ -537,7 +537,7 @@ int wolfSSH_accept(WOLFSSH* ssh)
537537 }
538538 ssh -> acceptState = ACCEPT_SERVER_KEXINIT_SENT ;
539539 WLOG (WS_LOG_DEBUG , acceptState , "SERVER_KEXINIT_SENT" );
540- NO_BREAK ;
540+ FALL_THROUGH ;
541541
542542 case ACCEPT_SERVER_KEXINIT_SENT :
543543 while (ssh -> isKeying ) {
@@ -549,7 +549,7 @@ int wolfSSH_accept(WOLFSSH* ssh)
549549 }
550550 ssh -> acceptState = ACCEPT_KEYED ;
551551 WLOG (WS_LOG_DEBUG , acceptState , "KEYED" );
552- NO_BREAK ;
552+ FALL_THROUGH ;
553553
554554 case ACCEPT_KEYED :
555555 while (ssh -> clientState < CLIENT_USERAUTH_REQUEST_DONE ) {
@@ -561,7 +561,7 @@ int wolfSSH_accept(WOLFSSH* ssh)
561561 }
562562 ssh -> acceptState = ACCEPT_CLIENT_USERAUTH_REQUEST_DONE ;
563563 WLOG (WS_LOG_DEBUG , acceptState , "CLIENT_USERAUTH_REQUEST_DONE" );
564- NO_BREAK ;
564+ FALL_THROUGH ;
565565
566566 case ACCEPT_CLIENT_USERAUTH_REQUEST_DONE :
567567 if ( (ssh -> error = SendServiceAccept (ssh ,
@@ -573,7 +573,7 @@ int wolfSSH_accept(WOLFSSH* ssh)
573573 ssh -> acceptState = ACCEPT_SERVER_USERAUTH_ACCEPT_SENT ;
574574 WLOG (WS_LOG_DEBUG , acceptState ,
575575 "ACCEPT_SERVER_USERAUTH_ACCEPT_SENT" );
576- NO_BREAK ;
576+ FALL_THROUGH ;
577577
578578 case ACCEPT_SERVER_USERAUTH_ACCEPT_SENT :
579579 while (ssh -> clientState < CLIENT_USERAUTH_DONE ) {
@@ -585,7 +585,7 @@ int wolfSSH_accept(WOLFSSH* ssh)
585585 }
586586 ssh -> acceptState = ACCEPT_CLIENT_USERAUTH_DONE ;
587587 WLOG (WS_LOG_DEBUG , acceptState , "CLIENT_USERAUTH_DONE" );
588- NO_BREAK ;
588+ FALL_THROUGH ;
589589
590590 case ACCEPT_CLIENT_USERAUTH_DONE :
591591 if ( (ssh -> error = SendUserAuthSuccess (ssh )) < WS_SUCCESS ) {
@@ -595,7 +595,7 @@ int wolfSSH_accept(WOLFSSH* ssh)
595595 }
596596 ssh -> acceptState = ACCEPT_SERVER_USERAUTH_SENT ;
597597 WLOG (WS_LOG_DEBUG , acceptState , "SERVER_USERAUTH_SENT" );
598- NO_BREAK ;
598+ FALL_THROUGH ;
599599
600600 case ACCEPT_SERVER_USERAUTH_SENT :
601601 while (ssh -> clientState < CLIENT_CHANNEL_OPEN_DONE ) {
@@ -607,7 +607,7 @@ int wolfSSH_accept(WOLFSSH* ssh)
607607 }
608608 ssh -> acceptState = ACCEPT_SERVER_CHANNEL_ACCEPT_SENT ;
609609 WLOG (WS_LOG_DEBUG , acceptState , "SERVER_CHANNEL_ACCEPT_SENT" );
610- NO_BREAK ;
610+ FALL_THROUGH ;
611611
612612 case ACCEPT_SERVER_CHANNEL_ACCEPT_SENT :
613613 while (ssh -> clientState < CLIENT_DONE ) {
@@ -770,7 +770,7 @@ int wolfSSH_connect(WOLFSSH* ssh)
770770 }
771771 ssh -> connectState = CONNECT_CLIENT_VERSION_SENT ;
772772 WLOG (WS_LOG_DEBUG , connectState , "CLIENT_VERSION_SENT" );
773- NO_BREAK ;
773+ FALL_THROUGH ;
774774
775775 case CONNECT_CLIENT_VERSION_SENT :
776776 while (ssh -> serverState < SERVER_VERSION_DONE ) {
@@ -782,7 +782,7 @@ int wolfSSH_connect(WOLFSSH* ssh)
782782 }
783783 ssh -> connectState = CONNECT_SERVER_VERSION_DONE ;
784784 WLOG (WS_LOG_DEBUG , connectState , "SERVER_VERSION_DONE" );
785- NO_BREAK ;
785+ FALL_THROUGH ;
786786
787787 case CONNECT_SERVER_VERSION_DONE :
788788 if ( (ssh -> error = SendKexInit (ssh )) < WS_SUCCESS ) {
@@ -792,7 +792,7 @@ int wolfSSH_connect(WOLFSSH* ssh)
792792 }
793793 ssh -> connectState = CONNECT_CLIENT_KEXINIT_SENT ;
794794 WLOG (WS_LOG_DEBUG , connectState , "CLIENT_KEXINIT_SENT" );
795- NO_BREAK ;
795+ FALL_THROUGH ;
796796
797797 case CONNECT_CLIENT_KEXINIT_SENT :
798798 while (ssh -> serverState < SERVER_KEXINIT_DONE ) {
@@ -804,7 +804,7 @@ int wolfSSH_connect(WOLFSSH* ssh)
804804 }
805805 ssh -> connectState = CONNECT_SERVER_KEXINIT_DONE ;
806806 WLOG (WS_LOG_DEBUG , connectState , "SERVER_KEXINIT_DONE" );
807- NO_BREAK ;
807+ FALL_THROUGH ;
808808
809809 case CONNECT_SERVER_KEXINIT_DONE :
810810 if (ssh -> handshake == NULL ) {
@@ -825,7 +825,7 @@ int wolfSSH_connect(WOLFSSH* ssh)
825825 }
826826 ssh -> connectState = CONNECT_CLIENT_KEXDH_INIT_SENT ;
827827 WLOG (WS_LOG_DEBUG , connectState , "CLIENT_KEXDH_INIT_SENT" );
828- NO_BREAK ;
828+ FALL_THROUGH ;
829829
830830 case CONNECT_CLIENT_KEXDH_INIT_SENT :
831831 while (ssh -> isKeying ) {
@@ -837,7 +837,7 @@ int wolfSSH_connect(WOLFSSH* ssh)
837837 }
838838 ssh -> connectState = CONNECT_KEYED ;
839839 WLOG (WS_LOG_DEBUG , connectState , "KEYED" );
840- NO_BREAK ;
840+ FALL_THROUGH ;
841841
842842 case CONNECT_KEYED :
843843 if ( (ssh -> error = SendServiceRequest (ssh , ID_SERVICE_USERAUTH )) <
@@ -847,7 +847,7 @@ int wolfSSH_connect(WOLFSSH* ssh)
847847 }
848848 ssh -> connectState = CONNECT_CLIENT_USERAUTH_REQUEST_SENT ;
849849 WLOG (WS_LOG_DEBUG , connectState , "CLIENT_USERAUTH_REQUEST_SENT" );
850- NO_BREAK ;
850+ FALL_THROUGH ;
851851
852852 case CONNECT_CLIENT_USERAUTH_REQUEST_SENT :
853853 while (ssh -> serverState < SERVER_USERAUTH_REQUEST_DONE ) {
@@ -859,7 +859,7 @@ int wolfSSH_connect(WOLFSSH* ssh)
859859 }
860860 ssh -> connectState = CONNECT_SERVER_USERAUTH_REQUEST_DONE ;
861861 WLOG (WS_LOG_DEBUG , connectState , "SERVER_USERAUTH_REQUEST_DONE" );
862- NO_BREAK ;
862+ FALL_THROUGH ;
863863
864864 case CONNECT_SERVER_USERAUTH_REQUEST_DONE :
865865 #ifdef WOLFSSH_AGENT
@@ -880,7 +880,7 @@ int wolfSSH_connect(WOLFSSH* ssh)
880880 }
881881 ssh -> connectState = CONNECT_CLIENT_USERAUTH_SENT ;
882882 WLOG (WS_LOG_DEBUG , connectState , "CLIENT_USERAUTH_SENT" );
883- NO_BREAK ;
883+ FALL_THROUGH ;
884884
885885 case CONNECT_CLIENT_USERAUTH_SENT :
886886 while (ssh -> serverState < SERVER_USERAUTH_ACCEPT_DONE ) {
@@ -892,7 +892,7 @@ int wolfSSH_connect(WOLFSSH* ssh)
892892 }
893893 ssh -> connectState = CONNECT_SERVER_USERAUTH_ACCEPT_DONE ;
894894 WLOG (WS_LOG_DEBUG , connectState , "SERVER_USERAUTH_ACCEPT_DONE" );
895- NO_BREAK ;
895+ FALL_THROUGH ;
896896
897897 case CONNECT_SERVER_USERAUTH_ACCEPT_DONE :
898898 {
@@ -924,7 +924,7 @@ int wolfSSH_connect(WOLFSSH* ssh)
924924 ssh -> connectState = CONNECT_CLIENT_CHANNEL_OPEN_SESSION_SENT ;
925925 WLOG (WS_LOG_DEBUG , connectState ,
926926 "CLIENT_CHANNEL_OPEN_SESSION_SENT" );
927- NO_BREAK ;
927+ FALL_THROUGH ;
928928
929929 case CONNECT_CLIENT_CHANNEL_OPEN_SESSION_SENT :
930930 while (ssh -> serverState < SERVER_CHANNEL_OPEN_DONE ) {
@@ -937,7 +937,7 @@ int wolfSSH_connect(WOLFSSH* ssh)
937937 ssh -> connectState = CONNECT_SERVER_CHANNEL_OPEN_SESSION_DONE ;
938938 WLOG (WS_LOG_DEBUG , connectState ,
939939 "SERVER_CHANNEL_OPEN_SESSION_DONE" );
940- NO_BREAK ;
940+ FALL_THROUGH ;
941941
942942 case CONNECT_SERVER_CHANNEL_OPEN_SESSION_DONE :
943943 #ifdef WOLFSSH_AGENT
@@ -953,7 +953,7 @@ int wolfSSH_connect(WOLFSSH* ssh)
953953 WLOG (WS_LOG_DEBUG , connectState ,
954954 "CLIENT_CHANNEL_AGENT_REQUEST_SENT" );
955955 ssh -> connectState = CONNECT_CLIENT_CHANNEL_AGENT_REQUEST_SENT ;
956- NO_BREAK ;
956+ FALL_THROUGH ;
957957
958958 case CONNECT_CLIENT_CHANNEL_AGENT_REQUEST_SENT :
959959 #if defined(WOLFSSH_TERM ) && !defined(NO_FILESYSTEM )
@@ -969,7 +969,7 @@ int wolfSSH_connect(WOLFSSH* ssh)
969969 WLOG (WS_LOG_DEBUG , connectState ,
970970 "CLIENT_CHANNEL_TERMINAL_REQUEST_SENT" );
971971 ssh -> connectState = CONNECT_CLIENT_CHANNEL_TERMINAL_REQUEST_SENT ;
972- NO_BREAK ;
972+ FALL_THROUGH ;
973973
974974 case CONNECT_CLIENT_CHANNEL_TERMINAL_REQUEST_SENT :
975975 if ( (ssh -> error = SendChannelRequest (ssh , ssh -> channelName ,
@@ -981,7 +981,7 @@ int wolfSSH_connect(WOLFSSH* ssh)
981981 ssh -> connectState = CONNECT_CLIENT_CHANNEL_REQUEST_SENT ;
982982 WLOG (WS_LOG_DEBUG , connectState ,
983983 "CLIENT_CHANNEL_REQUEST_SENT" );
984- NO_BREAK ;
984+ FALL_THROUGH ;
985985
986986 case CONNECT_CLIENT_CHANNEL_REQUEST_SENT :
987987 while (ssh -> serverState < SERVER_DONE ) {
@@ -1530,7 +1530,7 @@ int wolfSSH_SetChannelType(WOLFSSH* ssh, byte type, byte* name, word32 nameSz)
15301530 WLOG (WS_LOG_DEBUG , "Server side exec unsupported" );
15311531 return WS_BAD_ARGUMENT ;
15321532 }
1533- NO_BREAK ;
1533+ FALL_THROUGH ;
15341534
15351535 case WOLFSSH_SESSION_SUBSYSTEM :
15361536 ssh -> connectChannelId = type ;
0 commit comments