/*
* In TLSv1.3 NewSessionTicket messages arrive after the handshake and can
- * come at any time. Therefore we use a callback to write out the session
+ * come at any time. Therefore, we use a callback to write out the session
* when we know about it. This approach works for < TLSv1.3 as well.
*/
SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_CLIENT
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
/*
* Under Windows/DOS we make the assumption that we can always
- * write to the tty: therefore if we need to write to the tty we
+ * write to the tty: therefore, if we need to write to the tty we
* just fall through. Otherwise we timeout the select every
* second and see if there are any keypresses. Note: this is a
* hack, in a proper Windows application we wouldn't do this.
/*
* We also print the verify results when we dump session information,
* but in TLSv1.3 we may not get that right away (or at all) depending
- * on when we get a NewSessionTicket. Therefore we print it now as well.
+ * on when we get a NewSessionTicket. Therefore, we print it now as well.
*/
verify_result = SSL_get_verify_result(s);
BIO_printf(bio, "Verify return code: %ld (%s)\n", verify_result,