summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_lib.c
diff options
context:
space:
mode:
authortedu <>2014-05-30 14:30:50 +0000
committertedu <>2014-05-30 14:30:50 +0000
commitd970fd597dc43c71716f5ce1db8f102515a73ad8 (patch)
treecbf937e75b5dc1f5e8f2452d45ad4d6942a9b1d4 /src/lib/libssl/s3_lib.c
parentd7bb67cc99974281f55641afa52a0f9e8f1ff938 (diff)
downloadopenbsd-d970fd597dc43c71716f5ce1db8f102515a73ad8.tar.gz
openbsd-d970fd597dc43c71716f5ce1db8f102515a73ad8.tar.bz2
openbsd-d970fd597dc43c71716f5ce1db8f102515a73ad8.zip
remove some #if 0 code. we don't need any more reminders that we're using
a not quite appropriate data structure. ok jsing
Diffstat (limited to 'src/lib/libssl/s3_lib.c')
-rw-r--r--src/lib/libssl/s3_lib.c9
1 files changed, 0 insertions, 9 deletions
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c
index da69caa6dd..477c53b15b 100644
--- a/src/lib/libssl/s3_lib.c
+++ b/src/lib/libssl/s3_lib.c
@@ -2999,17 +2999,12 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,
2999 /* Let's see which ciphers we can support */ 2999 /* Let's see which ciphers we can support */
3000 cert = s->cert; 3000 cert = s->cert;
3001 3001
3002#if 0
3003 /* 3002 /*
3004 * Do not set the compare functions, because this may lead to a 3003 * Do not set the compare functions, because this may lead to a
3005 * reordering by "id". We want to keep the original ordering. 3004 * reordering by "id". We want to keep the original ordering.
3006 * We may pay a price in performance during sk_SSL_CIPHER_find(), 3005 * We may pay a price in performance during sk_SSL_CIPHER_find(),
3007 * but would have to pay with the price of sk_SSL_CIPHER_dup(). 3006 * but would have to pay with the price of sk_SSL_CIPHER_dup().
3008 */ 3007 */
3009 sk_SSL_CIPHER_set_cmp_func(srvr, ssl_cipher_ptr_id_cmp);
3010 sk_SSL_CIPHER_set_cmp_func(clnt, ssl_cipher_ptr_id_cmp);
3011#endif
3012
3013 3008
3014 if (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE) { 3009 if (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE) {
3015 prio = srvr; 3010 prio = srvr;
@@ -3267,9 +3262,7 @@ ssl3_shutdown(SSL *s)
3267 3262
3268 if (!(s->shutdown & SSL_SENT_SHUTDOWN)) { 3263 if (!(s->shutdown & SSL_SENT_SHUTDOWN)) {
3269 s->shutdown|=SSL_SENT_SHUTDOWN; 3264 s->shutdown|=SSL_SENT_SHUTDOWN;
3270#if 1
3271 ssl3_send_alert(s, SSL3_AL_WARNING, SSL_AD_CLOSE_NOTIFY); 3265 ssl3_send_alert(s, SSL3_AL_WARNING, SSL_AD_CLOSE_NOTIFY);
3272#endif
3273 /* 3266 /*
3274 * Our shutdown alert has been sent now, and if it still needs 3267 * Our shutdown alert has been sent now, and if it still needs
3275 * to be written, s->s3->alert_dispatch will be true 3268 * to be written, s->s3->alert_dispatch will be true
@@ -3278,7 +3271,6 @@ ssl3_shutdown(SSL *s)
3278 return(-1); /* return WANT_WRITE */ 3271 return(-1); /* return WANT_WRITE */
3279 } else if (s->s3->alert_dispatch) { 3272 } else if (s->s3->alert_dispatch) {
3280 /* resend it if not sent */ 3273 /* resend it if not sent */
3281#if 1
3282 ret = s->method->ssl_dispatch_alert(s); 3274 ret = s->method->ssl_dispatch_alert(s);
3283 if (ret == -1) { 3275 if (ret == -1) {
3284 /* 3276 /*
@@ -3289,7 +3281,6 @@ ssl3_shutdown(SSL *s)
3289 */ 3281 */
3290 return (ret); 3282 return (ret);
3291 } 3283 }
3292#endif
3293 } else if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) { 3284 } else if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) {
3294 /* If we are waiting for a close from our peer, we are closed */ 3285 /* If we are waiting for a close from our peer, we are closed */
3295 s->method->ssl_read_bytes(s, 0, NULL, 0, 0); 3286 s->method->ssl_read_bytes(s, 0, NULL, 0, 0);