diff options
author | jsing <> | 2014-05-31 13:55:45 +0000 |
---|---|---|
committer | jsing <> | 2014-05-31 13:55:45 +0000 |
commit | 271202bd3e03fb36da38b089fe9b5a4dfd261b6e (patch) | |
tree | 9e335d18bc84509db285ef8ce9a9d91ec4667073 /src/lib/libssl/s3_lib.c | |
parent | f8714d1bf6f2bcedbbda341cf98326ef80874d62 (diff) | |
download | openbsd-271202bd3e03fb36da38b089fe9b5a4dfd261b6e.tar.gz openbsd-271202bd3e03fb36da38b089fe9b5a4dfd261b6e.tar.bz2 openbsd-271202bd3e03fb36da38b089fe9b5a4dfd261b6e.zip |
More manual OPENSSL_NO_EC and OPENSSL_NO_TLSEXT cleanup.
Diffstat (limited to 'src/lib/libssl/s3_lib.c')
-rw-r--r-- | src/lib/libssl/s3_lib.c | 6 |
1 files changed, 1 insertions, 5 deletions
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c index 9aa72a9c4e..3b6eefd99b 100644 --- a/src/lib/libssl/s3_lib.c +++ b/src/lib/libssl/s3_lib.c | |||
@@ -2409,7 +2409,7 @@ ssl3_clear(SSL *s) | |||
2409 | s->s3->in_read_app_data = 0; | 2409 | s->s3->in_read_app_data = 0; |
2410 | s->version = SSL3_VERSION; | 2410 | s->version = SSL3_VERSION; |
2411 | 2411 | ||
2412 | #if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG) | 2412 | #ifndef OPENSSL_NO_NEXTPROTONEG |
2413 | free(s->next_proto_negotiated); | 2413 | free(s->next_proto_negotiated); |
2414 | s->next_proto_negotiated = NULL; | 2414 | s->next_proto_negotiated = NULL; |
2415 | s->next_proto_negotiated_len = 0; | 2415 | s->next_proto_negotiated_len = 0; |
@@ -2972,11 +2972,9 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt, | |||
2972 | SSL_CIPHER *c, *ret = NULL; | 2972 | SSL_CIPHER *c, *ret = NULL; |
2973 | STACK_OF(SSL_CIPHER) *prio, *allow; | 2973 | STACK_OF(SSL_CIPHER) *prio, *allow; |
2974 | int i, ii, ok; | 2974 | int i, ii, ok; |
2975 | #if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_EC) | ||
2976 | unsigned int j; | 2975 | unsigned int j; |
2977 | int ec_ok, ec_nid; | 2976 | int ec_ok, ec_nid; |
2978 | unsigned char ec_search1 = 0, ec_search2 = 0; | 2977 | unsigned char ec_search1 = 0, ec_search2 = 0; |
2979 | #endif | ||
2980 | CERT *cert; | 2978 | CERT *cert; |
2981 | unsigned long alg_k, alg_a, mask_k, mask_a, emask_k, emask_a; | 2979 | unsigned long alg_k, alg_a, mask_k, mask_a, emask_k, emask_a; |
2982 | 2980 | ||
@@ -3167,14 +3165,12 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt, | |||
3167 | continue; | 3165 | continue; |
3168 | ii = sk_SSL_CIPHER_find(allow, c); | 3166 | ii = sk_SSL_CIPHER_find(allow, c); |
3169 | if (ii >= 0) { | 3167 | if (ii >= 0) { |
3170 | #if !defined(OPENSSL_NO_EC) && !defined(OPENSSL_NO_TLSEXT) | ||
3171 | if ((alg_k & SSL_kEECDH) && | 3168 | if ((alg_k & SSL_kEECDH) && |
3172 | (alg_a & SSL_aECDSA) && s->s3->is_probably_safari) { | 3169 | (alg_a & SSL_aECDSA) && s->s3->is_probably_safari) { |
3173 | if (!ret) | 3170 | if (!ret) |
3174 | ret = sk_SSL_CIPHER_value(allow, ii); | 3171 | ret = sk_SSL_CIPHER_value(allow, ii); |
3175 | continue; | 3172 | continue; |
3176 | } | 3173 | } |
3177 | #endif | ||
3178 | ret = sk_SSL_CIPHER_value(allow, ii); | 3174 | ret = sk_SSL_CIPHER_value(allow, ii); |
3179 | break; | 3175 | break; |
3180 | } | 3176 | } |