summaryrefslogtreecommitdiffstats
path: root/lib/libssl/ssl_srvr.c
diff options
context:
space:
mode:
authortb <tb@openbsd.org>2021-02-20 14:16:56 +0000
committertb <tb@openbsd.org>2021-02-20 14:16:56 +0000
commit3586f9d4d89a8481a4b05d91d6ae7046abda9468 (patch)
tree36bf93f518177896848003d3ac25e7950e9f085a /lib/libssl/ssl_srvr.c
parentRename f_err into fatal_err. (diff)
downloadwireguard-openbsd-3586f9d4d89a8481a4b05d91d6ae7046abda9468.tar.xz
wireguard-openbsd-3586f9d4d89a8481a4b05d91d6ae7046abda9468.zip
ugly whitespace
Diffstat (limited to 'lib/libssl/ssl_srvr.c')
-rw-r--r--lib/libssl/ssl_srvr.c12
1 files changed, 6 insertions, 6 deletions
diff --git a/lib/libssl/ssl_srvr.c b/lib/libssl/ssl_srvr.c
index 15dda5108ce..be9c27f73f8 100644
--- a/lib/libssl/ssl_srvr.c
+++ b/lib/libssl/ssl_srvr.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ssl_srvr.c,v 1.94 2021/02/20 14:14:16 tb Exp $ */
+/* $OpenBSD: ssl_srvr.c,v 1.95 2021/02/20 14:16:56 tb Exp $ */
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
* All rights reserved.
*
@@ -1126,8 +1126,8 @@ ssl3_get_client_hello(SSL *s)
/*
* We now have the following setup.
* client_random
- * cipher_list - our prefered list of ciphers
- * ciphers - the clients prefered list of ciphers
+ * cipher_list - our prefered list of ciphers
+ * ciphers - the clients prefered list of ciphers
* compression - basically ignored right now
* ssl version is set - sslv3
* s->session - The ssl session has been setup.
@@ -1786,7 +1786,7 @@ ssl3_get_client_kex_rsa(SSL *s, CBS *cbs)
s->session->master_key_length =
tls1_generate_master_secret(s,
- s->session->master_key, p, SSL_MAX_MASTER_KEY_LENGTH);
+ s->session->master_key, p, SSL_MAX_MASTER_KEY_LENGTH);
freezero(pms, pms_len);
@@ -1968,7 +1968,7 @@ ssl3_get_client_kex_ecdhe_ecx(SSL *s, CBS *cbs)
static int
ssl3_get_client_kex_ecdhe(SSL *s, CBS *cbs)
{
- if (S3I(s)->tmp.x25519 != NULL)
+ if (S3I(s)->tmp.x25519 != NULL)
return ssl3_get_client_kex_ecdhe_ecx(s, cbs);
return ssl3_get_client_kex_ecdhe_ecp(s, cbs);
@@ -2356,7 +2356,7 @@ ssl3_get_client_certificate(SSL *s)
if (S3I(s)->tmp.message_type == SSL3_MT_CLIENT_KEY_EXCHANGE) {
if ((s->verify_mode & SSL_VERIFY_PEER) &&
(s->verify_mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT)) {
- SSLerror(s, SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE);
+ SSLerror(s, SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE);
al = SSL_AD_HANDSHAKE_FAILURE;
goto fatal_err;
}