@@ -142,7 +142,9 @@ int main(int argc, char** argv)
142142 WOLFSSL_VERIFY_PEER | WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT , NULL );
143143
144144#if 0
145- /* Example: "TLS13-AES256-GCM-SHA384", "TLS13-AES128-GCM-SHA256" or "TLS13-CHACHA20-POLY1305-SHA256" */
145+ /* Examples: "TLS13-AES256-GCM-SHA384",
146+ * "TLS13-AES128-GCM-SHA256" or
147+ * "TLS13-CHACHA20-POLY1305-SHA256" */
146148 wolfSSL_CTX_set_cipher_list (ctx , "TLS13-AES256-GCM-SHA384" );
147149#endif
148150
@@ -238,7 +240,6 @@ int main(int argc, char** argv)
238240 }
239241
240242
241-
242243 /* Write our reply into buff */
243244 memset (buff , 0 , sizeof (buff ));
244245 memcpy (buff , reply , strlen (reply ));
@@ -264,14 +265,12 @@ int main(int argc, char** argv)
264265
265266exit :
266267 /* Cleanup and return */
267- if (ssl )
268- wolfSSL_free (ssl ); /* Free the wolfSSL object */
268+ wolfSSL_free (ssl ); /* Free the wolfSSL object */
269269 if (connd != SOCKET_INVALID )
270- close (connd ); /* Close the connection to the client */
270+ close (connd ); /* Close the connection to the client */
271271 if (sockfd != SOCKET_INVALID )
272272 close (sockfd ); /* Close the socket listening for clients */
273- if (ctx )
274- wolfSSL_CTX_free (ctx ); /* Free the wolfSSL context object */
273+ wolfSSL_CTX_free (ctx ); /* Free the wolfSSL context object */
275274 wolfSSL_Cleanup (); /* Cleanup the wolfSSL environment */
276275#else
277276 printf ("Please configure wolfSSL with --enable-cryptocb and try again\n" );
0 commit comments