summaryrefslogtreecommitdiffstats
path: root/lib/libssl/src/ssl/s3_clnt.c
diff options
context:
space:
mode:
authortedu <tedu@openbsd.org>2014-09-19 14:32:23 +0000
committertedu <tedu@openbsd.org>2014-09-19 14:32:23 +0000
commitc7ed836e0f4e830b7705d5a08e4f11dff0997cd3 (patch)
tree010c04482b554872e73698b26cbdb8b499fc5c77 /lib/libssl/src/ssl/s3_clnt.c
parentFix on 32bit platforms where 0xdeadbeef > LONG_MAX. (diff)
downloadwireguard-openbsd-c7ed836e0f4e830b7705d5a08e4f11dff0997cd3.tar.xz
wireguard-openbsd-c7ed836e0f4e830b7705d5a08e4f11dff0997cd3.zip
remove obfuscating parens. man operator is your friend.
Diffstat (limited to 'lib/libssl/src/ssl/s3_clnt.c')
-rw-r--r--lib/libssl/src/ssl/s3_clnt.c12
1 files changed, 6 insertions, 6 deletions
diff --git a/lib/libssl/src/ssl/s3_clnt.c b/lib/libssl/src/ssl/s3_clnt.c
index bbe2b913921..1f64091f87e 100644
--- a/lib/libssl/src/ssl/s3_clnt.c
+++ b/lib/libssl/src/ssl/s3_clnt.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: s3_clnt.c,v 1.89 2014/09/07 12:16:23 jsing Exp $ */
+/* $OpenBSD: s3_clnt.c,v 1.90 2014/09/19 14:32:23 tedu Exp $ */
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
* All rights reserved.
*
@@ -661,7 +661,7 @@ ssl3_client_hello(SSL *s)
RAND_pseudo_bytes(p, SSL3_RANDOM_SIZE);
/* Do the message type and length last */
- d = p = &(buf[4]);
+ d = p = &buf[4];
/*
* Version indicates the negotiated version: for example from
@@ -1489,10 +1489,10 @@ ssl3_get_key_exchange(SSL *s)
(num == 2) ? s->ctx->md5 : s->ctx->sha1,
NULL);
EVP_DigestUpdate(&md_ctx,
- &(s->s3->client_random[0]),
+ s->s3->client_random,
SSL3_RANDOM_SIZE);
EVP_DigestUpdate(&md_ctx,
- &(s->s3->server_random[0]),
+ s->s3->server_random,
SSL3_RANDOM_SIZE);
EVP_DigestUpdate(&md_ctx, param, param_len);
EVP_DigestFinal_ex(&md_ctx, q,
@@ -1517,9 +1517,9 @@ ssl3_get_key_exchange(SSL *s)
}
} else {
EVP_VerifyInit_ex(&md_ctx, md, NULL);
- EVP_VerifyUpdate(&md_ctx, &(s->s3->client_random[0]),
+ EVP_VerifyUpdate(&md_ctx, s->s3->client_random,
SSL3_RANDOM_SIZE);
- EVP_VerifyUpdate(&md_ctx, &(s->s3->server_random[0]),
+ EVP_VerifyUpdate(&md_ctx, s->s3->server_random,
SSL3_RANDOM_SIZE);
EVP_VerifyUpdate(&md_ctx, param, param_len);
if (EVP_VerifyFinal(&md_ctx, p,(int)n, pkey) <= 0) {