diff options
| author | tedu <> | 2014-05-30 14:30:50 +0000 | 
|---|---|---|
| committer | tedu <> | 2014-05-30 14:30:50 +0000 | 
| commit | d970fd597dc43c71716f5ce1db8f102515a73ad8 (patch) | |
| tree | cbf937e75b5dc1f5e8f2452d45ad4d6942a9b1d4 /src/lib/libssl/s3_lib.c | |
| parent | d7bb67cc99974281f55641afa52a0f9e8f1ff938 (diff) | |
| download | openbsd-d970fd597dc43c71716f5ce1db8f102515a73ad8.tar.gz openbsd-d970fd597dc43c71716f5ce1db8f102515a73ad8.tar.bz2 openbsd-d970fd597dc43c71716f5ce1db8f102515a73ad8.zip  | |
remove some #if 0 code. we don't need any more reminders that we're using
a not quite appropriate data structure. ok jsing
Diffstat (limited to 'src/lib/libssl/s3_lib.c')
| -rw-r--r-- | src/lib/libssl/s3_lib.c | 9 | 
1 files changed, 0 insertions, 9 deletions
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c index da69caa6dd..477c53b15b 100644 --- a/src/lib/libssl/s3_lib.c +++ b/src/lib/libssl/s3_lib.c  | |||
| @@ -2999,17 +2999,12 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt, | |||
| 2999 | /* Let's see which ciphers we can support */ | 2999 | /* Let's see which ciphers we can support */ | 
| 3000 | cert = s->cert; | 3000 | cert = s->cert; | 
| 3001 | 3001 | ||
| 3002 | #if 0 | ||
| 3003 | /* | 3002 | /* | 
| 3004 | * Do not set the compare functions, because this may lead to a | 3003 | * Do not set the compare functions, because this may lead to a | 
| 3005 | * reordering by "id". We want to keep the original ordering. | 3004 | * reordering by "id". We want to keep the original ordering. | 
| 3006 | * We may pay a price in performance during sk_SSL_CIPHER_find(), | 3005 | * We may pay a price in performance during sk_SSL_CIPHER_find(), | 
| 3007 | * but would have to pay with the price of sk_SSL_CIPHER_dup(). | 3006 | * but would have to pay with the price of sk_SSL_CIPHER_dup(). | 
| 3008 | */ | 3007 | */ | 
| 3009 | sk_SSL_CIPHER_set_cmp_func(srvr, ssl_cipher_ptr_id_cmp); | ||
| 3010 | sk_SSL_CIPHER_set_cmp_func(clnt, ssl_cipher_ptr_id_cmp); | ||
| 3011 | #endif | ||
| 3012 | |||
| 3013 | 3008 | ||
| 3014 | if (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE) { | 3009 | if (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE) { | 
| 3015 | prio = srvr; | 3010 | prio = srvr; | 
| @@ -3267,9 +3262,7 @@ ssl3_shutdown(SSL *s) | |||
| 3267 | 3262 | ||
| 3268 | if (!(s->shutdown & SSL_SENT_SHUTDOWN)) { | 3263 | if (!(s->shutdown & SSL_SENT_SHUTDOWN)) { | 
| 3269 | s->shutdown|=SSL_SENT_SHUTDOWN; | 3264 | s->shutdown|=SSL_SENT_SHUTDOWN; | 
| 3270 | #if 1 | ||
| 3271 | ssl3_send_alert(s, SSL3_AL_WARNING, SSL_AD_CLOSE_NOTIFY); | 3265 | ssl3_send_alert(s, SSL3_AL_WARNING, SSL_AD_CLOSE_NOTIFY); | 
| 3272 | #endif | ||
| 3273 | /* | 3266 | /* | 
| 3274 | * Our shutdown alert has been sent now, and if it still needs | 3267 | * Our shutdown alert has been sent now, and if it still needs | 
| 3275 | * to be written, s->s3->alert_dispatch will be true | 3268 | * to be written, s->s3->alert_dispatch will be true | 
| @@ -3278,7 +3271,6 @@ ssl3_shutdown(SSL *s) | |||
| 3278 | return(-1); /* return WANT_WRITE */ | 3271 | return(-1); /* return WANT_WRITE */ | 
| 3279 | } else if (s->s3->alert_dispatch) { | 3272 | } else if (s->s3->alert_dispatch) { | 
| 3280 | /* resend it if not sent */ | 3273 | /* resend it if not sent */ | 
| 3281 | #if 1 | ||
| 3282 | ret = s->method->ssl_dispatch_alert(s); | 3274 | ret = s->method->ssl_dispatch_alert(s); | 
| 3283 | if (ret == -1) { | 3275 | if (ret == -1) { | 
| 3284 | /* | 3276 | /* | 
| @@ -3289,7 +3281,6 @@ ssl3_shutdown(SSL *s) | |||
| 3289 | */ | 3281 | */ | 
| 3290 | return (ret); | 3282 | return (ret); | 
| 3291 | } | 3283 | } | 
| 3292 | #endif | ||
| 3293 | } else if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) { | 3284 | } else if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) { | 
| 3294 | /* If we are waiting for a close from our peer, we are closed */ | 3285 | /* If we are waiting for a close from our peer, we are closed */ | 
| 3295 | s->method->ssl_read_bytes(s, 0, NULL, 0, 0); | 3286 | s->method->ssl_read_bytes(s, 0, NULL, 0, 0); | 
