diff options
| author | jsing <> | 2014-05-31 13:55:45 +0000 |
|---|---|---|
| committer | jsing <> | 2014-05-31 13:55:45 +0000 |
| commit | ef2245a4e5301e72bf29acb6077482ad202e15aa (patch) | |
| tree | 9e335d18bc84509db285ef8ce9a9d91ec4667073 /src/lib/libssl/s3_lib.c | |
| parent | 6642f462e1f65b6e032a6cc0f6d53d69232c42a5 (diff) | |
| download | openbsd-ef2245a4e5301e72bf29acb6077482ad202e15aa.tar.gz openbsd-ef2245a4e5301e72bf29acb6077482ad202e15aa.tar.bz2 openbsd-ef2245a4e5301e72bf29acb6077482ad202e15aa.zip | |
More manual OPENSSL_NO_EC and OPENSSL_NO_TLSEXT cleanup.
Diffstat (limited to 'src/lib/libssl/s3_lib.c')
| -rw-r--r-- | src/lib/libssl/s3_lib.c | 6 |
1 files changed, 1 insertions, 5 deletions
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c index 9aa72a9c4e..3b6eefd99b 100644 --- a/src/lib/libssl/s3_lib.c +++ b/src/lib/libssl/s3_lib.c | |||
| @@ -2409,7 +2409,7 @@ ssl3_clear(SSL *s) | |||
| 2409 | s->s3->in_read_app_data = 0; | 2409 | s->s3->in_read_app_data = 0; |
| 2410 | s->version = SSL3_VERSION; | 2410 | s->version = SSL3_VERSION; |
| 2411 | 2411 | ||
| 2412 | #if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG) | 2412 | #ifndef OPENSSL_NO_NEXTPROTONEG |
| 2413 | free(s->next_proto_negotiated); | 2413 | free(s->next_proto_negotiated); |
| 2414 | s->next_proto_negotiated = NULL; | 2414 | s->next_proto_negotiated = NULL; |
| 2415 | s->next_proto_negotiated_len = 0; | 2415 | s->next_proto_negotiated_len = 0; |
| @@ -2972,11 +2972,9 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt, | |||
| 2972 | SSL_CIPHER *c, *ret = NULL; | 2972 | SSL_CIPHER *c, *ret = NULL; |
| 2973 | STACK_OF(SSL_CIPHER) *prio, *allow; | 2973 | STACK_OF(SSL_CIPHER) *prio, *allow; |
| 2974 | int i, ii, ok; | 2974 | int i, ii, ok; |
| 2975 | #if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_EC) | ||
| 2976 | unsigned int j; | 2975 | unsigned int j; |
| 2977 | int ec_ok, ec_nid; | 2976 | int ec_ok, ec_nid; |
| 2978 | unsigned char ec_search1 = 0, ec_search2 = 0; | 2977 | unsigned char ec_search1 = 0, ec_search2 = 0; |
| 2979 | #endif | ||
| 2980 | CERT *cert; | 2978 | CERT *cert; |
| 2981 | unsigned long alg_k, alg_a, mask_k, mask_a, emask_k, emask_a; | 2979 | unsigned long alg_k, alg_a, mask_k, mask_a, emask_k, emask_a; |
| 2982 | 2980 | ||
| @@ -3167,14 +3165,12 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt, | |||
| 3167 | continue; | 3165 | continue; |
| 3168 | ii = sk_SSL_CIPHER_find(allow, c); | 3166 | ii = sk_SSL_CIPHER_find(allow, c); |
| 3169 | if (ii >= 0) { | 3167 | if (ii >= 0) { |
| 3170 | #if !defined(OPENSSL_NO_EC) && !defined(OPENSSL_NO_TLSEXT) | ||
| 3171 | if ((alg_k & SSL_kEECDH) && | 3168 | if ((alg_k & SSL_kEECDH) && |
| 3172 | (alg_a & SSL_aECDSA) && s->s3->is_probably_safari) { | 3169 | (alg_a & SSL_aECDSA) && s->s3->is_probably_safari) { |
| 3173 | if (!ret) | 3170 | if (!ret) |
| 3174 | ret = sk_SSL_CIPHER_value(allow, ii); | 3171 | ret = sk_SSL_CIPHER_value(allow, ii); |
| 3175 | continue; | 3172 | continue; |
| 3176 | } | 3173 | } |
| 3177 | #endif | ||
| 3178 | ret = sk_SSL_CIPHER_value(allow, ii); | 3174 | ret = sk_SSL_CIPHER_value(allow, ii); |
| 3179 | break; | 3175 | break; |
| 3180 | } | 3176 | } |
