diff options
author | jsing <> | 2014-12-14 14:34:43 +0000 |
---|---|---|
committer | jsing <> | 2014-12-14 14:34:43 +0000 |
commit | b303e332970ffd772a791a3a52b851697dd671bc (patch) | |
tree | d5225f7d83af44c76a58e948450d586798882cf9 /src/lib/libssl/s3_both.c | |
parent | 8c353d1cc8300944b77e9bee6d4be75bd546eec1 (diff) | |
download | openbsd-b303e332970ffd772a791a3a52b851697dd671bc.tar.gz openbsd-b303e332970ffd772a791a3a52b851697dd671bc.tar.bz2 openbsd-b303e332970ffd772a791a3a52b851697dd671bc.zip |
unifdef OPENSSL_NO_NEXTPROTONEG, which is one of the last standing #ifndef
mazes in libssl. NPN is being replaced by ALPN, however it is still going
to be around for a while yet.
ok miod@
Diffstat (limited to 'src/lib/libssl/s3_both.c')
-rw-r--r-- | src/lib/libssl/s3_both.c | 11 |
1 files changed, 1 insertions, 10 deletions
diff --git a/src/lib/libssl/s3_both.c b/src/lib/libssl/s3_both.c index ffc10774d8..297665430a 100644 --- a/src/lib/libssl/s3_both.c +++ b/src/lib/libssl/s3_both.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s3_both.c,v 1.34 2014/12/10 15:43:31 jsing Exp $ */ | 1 | /* $OpenBSD: s3_both.c,v 1.35 2014/12/14 14:34:43 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -194,7 +194,6 @@ ssl3_send_finished(SSL *s, int a, int b, const char *sender, int slen) | |||
194 | return (ssl3_do_write(s, SSL3_RT_HANDSHAKE)); | 194 | return (ssl3_do_write(s, SSL3_RT_HANDSHAKE)); |
195 | } | 195 | } |
196 | 196 | ||
197 | #ifndef OPENSSL_NO_NEXTPROTONEG | ||
198 | /* ssl3_take_mac calculates the Finished MAC for the handshakes messages seen to far. */ | 197 | /* ssl3_take_mac calculates the Finished MAC for the handshakes messages seen to far. */ |
199 | static void | 198 | static void |
200 | ssl3_take_mac(SSL *s) | 199 | ssl3_take_mac(SSL *s) |
@@ -217,7 +216,6 @@ ssl3_take_mac(SSL *s) | |||
217 | s->s3->tmp.peer_finish_md_len = s->method->ssl3_enc->final_finish_mac(s, | 216 | s->s3->tmp.peer_finish_md_len = s->method->ssl3_enc->final_finish_mac(s, |
218 | sender, slen, s->s3->tmp.peer_finish_md); | 217 | sender, slen, s->s3->tmp.peer_finish_md); |
219 | } | 218 | } |
220 | #endif | ||
221 | 219 | ||
222 | int | 220 | int |
223 | ssl3_get_finished(SSL *s, int a, int b) | 221 | ssl3_get_finished(SSL *s, int a, int b) |
@@ -226,11 +224,6 @@ ssl3_get_finished(SSL *s, int a, int b) | |||
226 | long n; | 224 | long n; |
227 | unsigned char *p; | 225 | unsigned char *p; |
228 | 226 | ||
229 | #ifdef OPENSSL_NO_NEXTPROTONEG | ||
230 | /* the mac has already been generated when we received the | ||
231 | * change cipher spec message and is in s->s3->tmp.peer_finish_md. | ||
232 | */ | ||
233 | #endif | ||
234 | 227 | ||
235 | n = s->method->ssl_get_message(s, a, b, SSL3_MT_FINISHED, | 228 | n = s->method->ssl_get_message(s, a, b, SSL3_MT_FINISHED, |
236 | 64, /* should actually be 36+4 :-) */ &ok); | 229 | 64, /* should actually be 36+4 :-) */ &ok); |
@@ -505,12 +498,10 @@ ssl3_get_message(SSL *s, int st1, int stn, int mt, long max, int *ok) | |||
505 | n -= i; | 498 | n -= i; |
506 | } | 499 | } |
507 | 500 | ||
508 | #ifndef OPENSSL_NO_NEXTPROTONEG | ||
509 | /* If receiving Finished, record MAC of prior handshake messages for | 501 | /* If receiving Finished, record MAC of prior handshake messages for |
510 | * Finished verification. */ | 502 | * Finished verification. */ |
511 | if (*s->init_buf->data == SSL3_MT_FINISHED) | 503 | if (*s->init_buf->data == SSL3_MT_FINISHED) |
512 | ssl3_take_mac(s); | 504 | ssl3_take_mac(s); |
513 | #endif | ||
514 | 505 | ||
515 | /* Feed this message into MAC computation. */ | 506 | /* Feed this message into MAC computation. */ |
516 | ssl3_finish_mac(s, (unsigned char *)s->init_buf->data, s->init_num + 4); | 507 | ssl3_finish_mac(s, (unsigned char *)s->init_buf->data, s->init_num + 4); |