fix whitespace
authorBodo Möller <bodo@openssl.org>
Wed, 28 May 2008 22:22:50 +0000 (22:22 +0000)
committerBodo Möller <bodo@openssl.org>
Wed, 28 May 2008 22:22:50 +0000 (22:22 +0000)
STATUS
ssl/s3_clnt.c

diff --git a/STATUS b/STATUS
index c2c3357f61983afcce5c0bf1642d42d04ae54f26..88dd50aebf92121e9cfe94d42e12ea7047297a27 100644 (file)
--- a/STATUS
+++ b/STATUS
@@ -1,13 +1,13 @@
 
   OpenSSL STATUS                           Last modified at
-  ______________                           $Date: 2008/05/28 07:37:13 $
+  ______________                           $Date: 2008/05/28 22:22:49 $
 
   DEVELOPMENT STATE
 
     o  OpenSSL 0.9.9:  Under development...
     o  OpenSSL 0.9.8h: Released on May       28th, 2008
     o  OpenSSL 0.9.8g: Released on October   19th, 2007
-    o  OpenSSL 0.9.8f: Released on October   11th, 2007 
+    o  OpenSSL 0.9.8f: Released on October   11th, 2007
     o  OpenSSL 0.9.8e: Released on February  23rd, 2007
     o  OpenSSL 0.9.8d: Released on September 28th, 2006
     o  OpenSSL 0.9.8c: Released on September  5th, 2006
index f6864cdc50ad7c74ad4c7f2d290cb53e9bf0a8b8..e470bed33db1e7cec44c805437d6f9831c336a3b 100644 (file)
@@ -2061,12 +2061,12 @@ int ssl3_send_client_key_exchange(SSL *s)
                        {
                        DH *dh_srvr,*dh_clnt;
 
-                        if (s->session->sess_cert == NULL) 
-                                {
-                                ssl3_send_alert(s,SSL3_AL_FATAL,SSL_AD_UNEXPECTED_MESSAGE);
-                                SSLerr(SSL_F_SSL3_SEND_CLIENT_KEY_EXCHANGE,SSL_R_UNEXPECTED_MESSAGE);
-                                goto err;
-                                }
+                       if (s->session->sess_cert == NULL) 
+                               {
+                               ssl3_send_alert(s,SSL3_AL_FATAL,SSL_AD_UNEXPECTED_MESSAGE);
+                               SSLerr(SSL_F_SSL3_SEND_CLIENT_KEY_EXCHANGE,SSL_R_UNEXPECTED_MESSAGE);
+                               goto err;
+                               }
 
                        if (s->session->sess_cert->peer_dh_tmp != NULL)
                                dh_srvr=s->session->sess_cert->peer_dh_tmp;