diff options
author | teor <teor2345@gmail.com> | 2015-06-16 03:10:44 +1000 |
---|---|---|
committer | teor <teor2345@gmail.com> | 2015-06-16 03:10:44 +1000 |
commit | 4079d2e0a5d3b8abed541d473485f22ae8746636 (patch) | |
tree | ef2c7f59f5c348c92941c6495b3a428c8e4801cf /src | |
parent | 130a9c0ac8aa13acf7e59872aa628e1864fc828d (diff) | |
download | tor-4079d2e0a5d3b8abed541d473485f22ae8746636.tar.gz tor-4079d2e0a5d3b8abed541d473485f22ae8746636.zip |
Fix spacing in tortls.c
Diffstat (limited to 'src')
-rw-r--r-- | src/common/tortls.c | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/src/common/tortls.c b/src/common/tortls.c index 98840c15cf..bd0eaffa27 100644 --- a/src/common/tortls.c +++ b/src/common/tortls.c @@ -2641,7 +2641,6 @@ SSL_SESSION_get_master_key(SSL_SESSION *s, uint8_t *out, size_t len) } #endif - /** Set the DIGEST256_LEN buffer at <b>secrets_out</b> to the value used in * the v3 handshake to prove that the client knows the TLS secrets for the * connection <b>tls</b>. Return 0 on success, -1 on failure. @@ -2677,7 +2676,9 @@ tor_tls_get_tlssecrets,(tor_tls_t *tls, uint8_t *secrets_out)) tor_assert(r == client_random_len); } { - size_t r = SSL_get_server_random(ssl, buf+client_random_len, server_random_len); + size_t r = SSL_get_server_random(ssl, + buf+client_random_len, + server_random_len); tor_assert(r == server_random_len); } uint8_t *master_key = tor_malloc_zero(master_key_len); |