Fix documentation string.

SSL_CTX_set_retain_only_sha256_of_client_certs's comment wasn't quite right.

Change-Id: I40527eebf2988d117cd8bd544bb5f16936c2cbfb
Reviewed-on: https://boringssl-review.googlesource.com/6982
Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
David Benjamin 2016-01-27 17:17:24 -05:00 committed by Adam Langley
parent 87c7640773
commit 8f2d4e344c

View File

@ -2897,9 +2897,9 @@ OPENSSL_EXPORT size_t SSL_get_server_random(const SSL *ssl, uint8_t *out,
* NULL if one has not been negotiated yet or there is no pending handshake. */ * NULL if one has not been negotiated yet or there is no pending handshake. */
OPENSSL_EXPORT const SSL_CIPHER *SSL_get_pending_cipher(const SSL *ssl); OPENSSL_EXPORT const SSL_CIPHER *SSL_get_pending_cipher(const SSL *ssl);
/* SSL_CTX_retain_only_sha256_of_client_certs, on a server, sets whether only /* SSL_CTX_set_retain_only_sha256_of_client_certs, on a server, sets whether
* the SHA-256 hash of peer's certificate should be saved in memory and in the * only the SHA-256 hash of peer's certificate should be saved in memory and in
* session. This can save memory, ticket size and session cache space. If * the session. This can save memory, ticket size and session cache space. If
* enabled, |SSL_get_peer_certificate| will return NULL after the handshake * enabled, |SSL_get_peer_certificate| will return NULL after the handshake
* completes. See the |peer_sha256| field of |SSL_SESSION| for the hash. */ * completes. See the |peer_sha256| field of |SSL_SESSION| for the hash. */
OPENSSL_EXPORT void SSL_CTX_set_retain_only_sha256_of_client_certs(SSL_CTX *ctx, OPENSSL_EXPORT void SSL_CTX_set_retain_only_sha256_of_client_certs(SSL_CTX *ctx,