|
@@ -622,7 +622,7 @@ tor_tls_context_new(crypto_pk_env_t *identity, unsigned int key_lifetime)
|
|
|
|
|
|
#ifdef V2_HANDSHAKE_SERVER
|
|
|
/** Return true iff the cipher list suggested by the client for <b>ssl</b> is
|
|
|
- * a list that indicates that the client know how to do the v2 TLS connection
|
|
|
+ * a list that indicates that the client knows how to do the v2 TLS connection
|
|
|
* handshake. */
|
|
|
static int
|
|
|
tor_tls_client_is_using_v2_ciphers(const SSL *ssl, const char *address)
|
|
@@ -666,7 +666,7 @@ tor_tls_client_is_using_v2_ciphers(const SSL *ssl, const char *address)
|
|
|
}
|
|
|
s = smartlist_join_strings(elts, ":", 0, NULL);
|
|
|
log_info(LD_NET, "Got a non-version-1 cipher list from %s. It is: '%s'",
|
|
|
- s, address);
|
|
|
+ address, s);
|
|
|
tor_free(s);
|
|
|
smartlist_free(elts);
|
|
|
}
|