summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorFrank Elias <69520919+FrankElias77@users.noreply.github.com>2021-10-22 16:01:41 -0400
committerGitHub <noreply@github.com>2021-10-22 16:01:41 -0400
commitde4c6e056e26bc61fc551e6b1e15c23a7d892389 (patch)
tree45ff75bf09b6cdcd37f3486e8d532aa63ff5f1b1
parentc5bc23fbd5676fb4920535f8d22574286ad707b5 (diff)
downloadsdl_ios-de4c6e056e26bc61fc551e6b1e15c23a7d892389.tar.gz
Co-authored-by: Joel Fischer <joeljfischer@gmail.com>
-rw-r--r--SmartDeviceLink/private/SDLProtocol.m2
1 files changed, 1 insertions, 1 deletions
diff --git a/SmartDeviceLink/private/SDLProtocol.m b/SmartDeviceLink/private/SDLProtocol.m
index 7a2f54f1b..1ed2faf12 100644
--- a/SmartDeviceLink/private/SDLProtocol.m
+++ b/SmartDeviceLink/private/SDLProtocol.m
@@ -825,7 +825,7 @@ NS_ASSUME_NONNULL_BEGIN
// If the handshake went bad and the security library ain't happy, send over the failure to the module. This should result in an ACK with encryption off.
SDLProtocolMessage *serverSecurityMessage = nil;
- if (serverHandshakeData == nil || serverHandshakeData.length == 0) {
+ if (serverHandshakeData.length == 0) {
SDLLogE(@"Error running TLS handshake procedure. Sending error to module. Error: %@", handshakeError);
serverSecurityMessage = [self.class sdl_serverSecurityFailedMessageWithClientMessageHeader:clientHandshakeMessage.header messageId:++_messageID];