diff options
author | Rich Salz <rsalz@akamai.com> | 2015-11-23 13:30:04 -0500 |
---|---|---|
committer | Rich Salz <rsalz@openssl.org> | 2015-11-23 13:51:23 -0500 |
commit | cc99bfa76bd25e40672841c78db9cc171be5488b (patch) | |
tree | a6b7cfeb46abbd525e2597d70f820450b5de127e /ssl | |
parent | e44380a990a3edf1cd0c190c6459c8c026d53646 (diff) | |
download | openssl-cc99bfa76bd25e40672841c78db9cc171be5488b.tar.gz |
Fix a few missed "if (!ptr)" cleanups
And a scalar !x --> x==0 test
Reviewed-by: Kurt Roeckx <kurt@openssl.org>
Diffstat (limited to 'ssl')
-rw-r--r-- | ssl/ssl_sess.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/ssl/ssl_sess.c b/ssl/ssl_sess.c index 964274600c..0984445b77 100644 --- a/ssl/ssl_sess.c +++ b/ssl/ssl_sess.c @@ -466,7 +466,7 @@ int ssl_get_new_session(SSL *s, int session) * Don't allow the callback to set the session length to zero. nor * set it higher than it was. */ - if (!tmp || (tmp > ss->session_id_length)) { + if (tmp == 0 || tmp > ss->session_id_length) { /* The callback set an illegal length */ SSLerr(SSL_F_SSL_GET_NEW_SESSION, SSL_R_SSL_SESSION_ID_HAS_BAD_LENGTH); |