Tune comments
diff --git a/include/polarssl/ssl.h b/include/polarssl/ssl.h
index bbc1f68..bee86a6 100644
--- a/include/polarssl/ssl.h
+++ b/include/polarssl/ssl.h
@@ -204,6 +204,7 @@
#define SSL_IS_CLIENT 0
#define SSL_IS_SERVER 1
+
#define SSL_COMPRESS_NULL 0
#define SSL_COMPRESS_DEFLATE 1
diff --git a/library/ssl_tls.c b/library/ssl_tls.c
index fbec135..ac82dfb 100644
--- a/library/ssl_tls.c
+++ b/library/ssl_tls.c
@@ -2227,10 +2227,6 @@
{
SSL_DEBUG_MSG( 1, ( "is a fatal alert message (msg %d)",
ssl->in_msg[1] ) );
- /**
- * Subtract from error code as ssl->in_msg[1] is 7-bit positive
- * error identifier.
- */
return( POLARSSL_ERR_SSL_FATAL_ALERT_MESSAGE );
}
@@ -4181,10 +4177,10 @@
/*
* Actually renegotiate current connection, triggered by either:
- * - calling ssl_renegotiate() on client,
- * - receiving a HelloRequest on client during ssl_read(),
- * - receiving any handshake message on server during ssl_read() after the
- * initial handshake is completed
+ * - any side: calling ssl_renegotiate(),
+ * - client: receiving a HelloRequest during ssl_read(),
+ * - server: receiving any handshake message on server during ssl_read() after
+ * the initial handshake is completed.
* If the handshake doesn't complete due to waiting for I/O, it will continue
* during the next calls to ssl_renegotiate() or ssl_read() respectively.
*/