aboutsummaryrefslogtreecommitdiff
path: root/ssl
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2015-01-16 09:21:50 +0000
committerMatt Caswell <matt@openssl.org>2015-01-22 09:19:59 +0000
commitc80fd6b215449f2ba7228af58979ac8709f74b82 (patch)
tree0269f83aff238ce66c2839e2a52c237caaa37ec3 /ssl
parent4b618848f9beb8271f24883694e097caa70013c0 (diff)
downloadopenssl-c80fd6b215449f2ba7228af58979ac8709f74b82.zip
openssl-c80fd6b215449f2ba7228af58979ac8709f74b82.tar.gz
openssl-c80fd6b215449f2ba7228af58979ac8709f74b82.tar.bz2
Further comment changes for reformat (master)
Reviewed-by: Tim Hudson <tjh@openssl.org>
Diffstat (limited to 'ssl')
-rw-r--r--ssl/d1_pkt.c6
-rw-r--r--ssl/kssl.h3
-rw-r--r--ssl/ssl.h9
3 files changed, 12 insertions, 6 deletions
diff --git a/ssl/d1_pkt.c b/ssl/d1_pkt.c
index a8a06b4..9a1394a 100644
--- a/ssl/d1_pkt.c
+++ b/ssl/d1_pkt.c
@@ -419,10 +419,12 @@ dtls1_process_record(SSL *s)
rr->orig_len=rr->length;
enc_err = s->method->ssl3_enc->enc(s,0);
- /* enc_err is:
+ /*-
+ * enc_err is:
* 0: (in non-constant time) if the record is publically invalid.
* 1: if the padding is valid
- * -1: if the padding is invalid */
+ * -1: if the padding is invalid
+ */
if (enc_err == 0)
{
/* For DTLS we simply ignore bad packets. */
diff --git a/ssl/kssl.h b/ssl/kssl.h
index c3d5492..c61dba7 100644
--- a/ssl/kssl.h
+++ b/ssl/kssl.h
@@ -99,7 +99,8 @@ typedef unsigned char krb5_octet;
#endif
-/* Uncomment this to debug kssl problems or
+/*-
+ * Uncomment this to debug kssl problems or
* to trace usage of the Kerberos session key
*
* #define KSSL_DEBUG
diff --git a/ssl/ssl.h b/ssl/ssl.h
index dd8b277..333c570 100644
--- a/ssl/ssl.h
+++ b/ssl/ssl.h
@@ -171,7 +171,8 @@ extern "C" {
#endif
/* SSLeay version number for ASN.1 encoding of the session information */
-/* Version 0 - initial version
+/*-
+ * Version 0 - initial version
* Version 1 - added the optional peer certificate
*/
#define SSL_SESSION_ASN1_VERSION 0x0001
@@ -1609,10 +1610,12 @@ extern "C" {
#define SSL_ST_READ_BODY 0xF1
#define SSL_ST_READ_DONE 0xF2
-/* Obtain latest Finished message
+/*-
+ * Obtain latest Finished message
* -- that we sent (SSL_get_finished)
* -- that we expected from peer (SSL_get_peer_finished).
- * Returns length (0 == no Finished so far), copies up to 'count' bytes. */
+ * Returns length (0 == no Finished so far), copies up to 'count' bytes.
+ */
size_t SSL_get_finished(const SSL *s, void *buf, size_t count);
size_t SSL_get_peer_finished(const SSL *s, void *buf, size_t count);