}
#endif
-
/** Set the DIGEST256_LEN buffer at <b>secrets_out</b> to the value used in
* the v3 handshake to prove that the client knows the TLS secrets for the
* connection <b>tls</b>. Return 0 on success, -1 on failure.
tor_assert(r == client_random_len);
}
{
- size_t r = SSL_get_server_random(ssl, buf+client_random_len, server_random_len);
+ size_t r = SSL_get_server_random(ssl,
+ buf+client_random_len,
+ server_random_len);
tor_assert(r == server_random_len);
}
uint8_t *master_key = tor_malloc_zero(master_key_len);