summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_clnt.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/ssl_clnt.c')
-rw-r--r--src/lib/libssl/ssl_clnt.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/src/lib/libssl/ssl_clnt.c b/src/lib/libssl/ssl_clnt.c
index 64085b953f..c721aede4e 100644
--- a/src/lib/libssl/ssl_clnt.c
+++ b/src/lib/libssl/ssl_clnt.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_clnt.c,v 1.157 2022/11/26 16:08:55 tb Exp $ */ 1/* $OpenBSD: ssl_clnt.c,v 1.158 2022/12/26 07:31:44 jmc Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -1633,7 +1633,7 @@ ssl3_get_new_session_ticket(SSL *s)
1633 } 1633 }
1634 1634
1635 /* 1635 /*
1636 * There are two ways to detect a resumed ticket sesion. 1636 * There are two ways to detect a resumed ticket session.
1637 * One is to set an appropriate session ID and then the server 1637 * One is to set an appropriate session ID and then the server
1638 * must return a match in ServerHello. This allows the normal 1638 * must return a match in ServerHello. This allows the normal
1639 * client session ID matching to work and we know much 1639 * client session ID matching to work and we know much
@@ -1941,7 +1941,7 @@ ssl3_send_client_kex_gost(SSL *s, CBB *cbb)
1941 int nid; 1941 int nid;
1942 int ret = 0; 1942 int ret = 0;
1943 1943
1944 /* Get server sertificate PKEY and create ctx from it */ 1944 /* Get server certificate PKEY and create ctx from it */
1945 pkey = X509_get0_pubkey(s->session->peer_cert); 1945 pkey = X509_get0_pubkey(s->session->peer_cert);
1946 if (pkey == NULL || s->session->peer_cert_type != SSL_PKEY_GOST01) { 1946 if (pkey == NULL || s->session->peer_cert_type != SSL_PKEY_GOST01) {
1947 SSLerror(s, SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER); 1947 SSLerror(s, SSL_R_NO_GOST_CERTIFICATE_SENT_BY_PEER);