diff options
author | Matt Caswell <matt@openssl.org> | 2016-06-14 10:41:00 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2016-06-14 10:41:00 +0100 |
commit | e7653f3bab1d44b4dad65637982e72a15ede0a49 (patch) | |
tree | 00545c87984a33d8a78618f89d1a8a9af540bb98 /ssl/t1_lib.c | |
parent | 5ec84dd75f7965942a55ef5382aa34b8417336c5 (diff) |
Fix comment
Fix a comment following commit c2c49969e23605.
RT2388
Reviewed-by: Rich Salz <rsalz@openssl.org>
Diffstat (limited to 'ssl/t1_lib.c')
-rw-r--r-- | ssl/t1_lib.c | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/ssl/t1_lib.c b/ssl/t1_lib.c index 20d67876a0..9250283e60 100644 --- a/ssl/t1_lib.c +++ b/ssl/t1_lib.c @@ -2521,8 +2521,7 @@ static int ssl_scan_serverhello_tlsext(SSL *s, PACKET *pkt, int *al) * an attack we should *always* see RI even on initial server hello * because the client doesn't see any renegotiation during an attack. * However this would mean we could not connect to any server which - * doesn't support RI so for the immediate future tolerate RI absence on - * initial connect only. + * doesn't support RI so for the immediate future tolerate RI absence */ if (!renegotiate_seen && !(s->options & SSL_OP_LEGACY_SERVER_CONNECT) && !(s->options & SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION)) { |