diff options
| author | jsing <> | 2014-12-14 14:34:43 +0000 |
|---|---|---|
| committer | jsing <> | 2014-12-14 14:34:43 +0000 |
| commit | 7f65acb8e319aa23abaf279f5a33cf12a9e69ac4 (patch) | |
| tree | d5225f7d83af44c76a58e948450d586798882cf9 /src/lib/libssl/s3_srvr.c | |
| parent | ca4aa6ef2e6a4d193810c33351a5570dfeb4a058 (diff) | |
| download | openbsd-7f65acb8e319aa23abaf279f5a33cf12a9e69ac4.tar.gz openbsd-7f65acb8e319aa23abaf279f5a33cf12a9e69ac4.tar.bz2 openbsd-7f65acb8e319aa23abaf279f5a33cf12a9e69ac4.zip | |
unifdef OPENSSL_NO_NEXTPROTONEG, which is one of the last standing #ifndef
mazes in libssl. NPN is being replaced by ALPN, however it is still going
to be around for a while yet.
ok miod@
Diffstat (limited to 'src/lib/libssl/s3_srvr.c')
| -rw-r--r-- | src/lib/libssl/s3_srvr.c | 18 |
1 files changed, 1 insertions, 17 deletions
diff --git a/src/lib/libssl/s3_srvr.c b/src/lib/libssl/s3_srvr.c index 645caf4bc9..783b1df782 100644 --- a/src/lib/libssl/s3_srvr.c +++ b/src/lib/libssl/s3_srvr.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s3_srvr.c,v 1.93 2014/12/10 15:43:31 jsing Exp $ */ | 1 | /* $OpenBSD: s3_srvr.c,v 1.94 2014/12/14 14:34:43 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -537,14 +537,10 @@ ssl3_accept(SSL *s) | |||
| 537 | * the client uses its key from the certificate | 537 | * the client uses its key from the certificate |
| 538 | * for key exchange. | 538 | * for key exchange. |
| 539 | */ | 539 | */ |
| 540 | #ifdef OPENSSL_NO_NEXTPROTONEG | ||
| 541 | s->state = SSL3_ST_SR_FINISHED_A; | ||
| 542 | #else | ||
| 543 | if (s->s3->next_proto_neg_seen) | 540 | if (s->s3->next_proto_neg_seen) |
| 544 | s->state = SSL3_ST_SR_NEXT_PROTO_A; | 541 | s->state = SSL3_ST_SR_NEXT_PROTO_A; |
| 545 | else | 542 | else |
| 546 | s->state = SSL3_ST_SR_FINISHED_A; | 543 | s->state = SSL3_ST_SR_FINISHED_A; |
| 547 | #endif | ||
| 548 | s->init_num = 0; | 544 | s->init_num = 0; |
| 549 | } else if (SSL_USE_SIGALGS(s) || (alg_k & SSL_kGOST)) { | 545 | } else if (SSL_USE_SIGALGS(s) || (alg_k & SSL_kGOST)) { |
| 550 | s->state = SSL3_ST_SR_CERT_VRFY_A; | 546 | s->state = SSL3_ST_SR_CERT_VRFY_A; |
| @@ -609,18 +605,13 @@ ssl3_accept(SSL *s) | |||
| 609 | if (ret <= 0) | 605 | if (ret <= 0) |
| 610 | goto end; | 606 | goto end; |
| 611 | 607 | ||
| 612 | #ifdef OPENSSL_NO_NEXTPROTONEG | ||
| 613 | s->state = SSL3_ST_SR_FINISHED_A; | ||
| 614 | #else | ||
| 615 | if (s->s3->next_proto_neg_seen) | 608 | if (s->s3->next_proto_neg_seen) |
| 616 | s->state = SSL3_ST_SR_NEXT_PROTO_A; | 609 | s->state = SSL3_ST_SR_NEXT_PROTO_A; |
| 617 | else | 610 | else |
| 618 | s->state = SSL3_ST_SR_FINISHED_A; | 611 | s->state = SSL3_ST_SR_FINISHED_A; |
| 619 | #endif | ||
| 620 | s->init_num = 0; | 612 | s->init_num = 0; |
| 621 | break; | 613 | break; |
| 622 | 614 | ||
| 623 | #ifndef OPENSSL_NO_NEXTPROTONEG | ||
| 624 | case SSL3_ST_SR_NEXT_PROTO_A: | 615 | case SSL3_ST_SR_NEXT_PROTO_A: |
| 625 | case SSL3_ST_SR_NEXT_PROTO_B: | 616 | case SSL3_ST_SR_NEXT_PROTO_B: |
| 626 | ret = ssl3_get_next_proto(s); | 617 | ret = ssl3_get_next_proto(s); |
| @@ -629,7 +620,6 @@ ssl3_accept(SSL *s) | |||
| 629 | s->init_num = 0; | 620 | s->init_num = 0; |
| 630 | s->state = SSL3_ST_SR_FINISHED_A; | 621 | s->state = SSL3_ST_SR_FINISHED_A; |
| 631 | break; | 622 | break; |
| 632 | #endif | ||
| 633 | 623 | ||
| 634 | case SSL3_ST_SR_FINISHED_A: | 624 | case SSL3_ST_SR_FINISHED_A: |
| 635 | case SSL3_ST_SR_FINISHED_B: | 625 | case SSL3_ST_SR_FINISHED_B: |
| @@ -701,9 +691,6 @@ ssl3_accept(SSL *s) | |||
| 701 | goto end; | 691 | goto end; |
| 702 | s->state = SSL3_ST_SW_FLUSH; | 692 | s->state = SSL3_ST_SW_FLUSH; |
| 703 | if (s->hit) { | 693 | if (s->hit) { |
| 704 | #ifdef OPENSSL_NO_NEXTPROTONEG | ||
| 705 | s->s3->tmp.next_state = SSL3_ST_SR_FINISHED_A; | ||
| 706 | #else | ||
| 707 | if (s->s3->next_proto_neg_seen) { | 694 | if (s->s3->next_proto_neg_seen) { |
| 708 | s->s3->flags |= SSL3_FLAGS_CCS_OK; | 695 | s->s3->flags |= SSL3_FLAGS_CCS_OK; |
| 709 | s->s3->tmp.next_state = | 696 | s->s3->tmp.next_state = |
| @@ -711,7 +698,6 @@ ssl3_accept(SSL *s) | |||
| 711 | } else | 698 | } else |
| 712 | s->s3->tmp.next_state = | 699 | s->s3->tmp.next_state = |
| 713 | SSL3_ST_SR_FINISHED_A; | 700 | SSL3_ST_SR_FINISHED_A; |
| 714 | #endif | ||
| 715 | } else | 701 | } else |
| 716 | s->s3->tmp.next_state = SSL_ST_OK; | 702 | s->s3->tmp.next_state = SSL_ST_OK; |
| 717 | s->init_num = 0; | 703 | s->init_num = 0; |
| @@ -2850,7 +2836,6 @@ ssl3_send_cert_status(SSL *s) | |||
| 2850 | return (ssl3_do_write(s, SSL3_RT_HANDSHAKE)); | 2836 | return (ssl3_do_write(s, SSL3_RT_HANDSHAKE)); |
| 2851 | } | 2837 | } |
| 2852 | 2838 | ||
| 2853 | # ifndef OPENSSL_NO_NEXTPROTONEG | ||
| 2854 | /* | 2839 | /* |
| 2855 | * ssl3_get_next_proto reads a Next Protocol Negotiation handshake message. | 2840 | * ssl3_get_next_proto reads a Next Protocol Negotiation handshake message. |
| 2856 | * It sets the next_proto member in s if found | 2841 | * It sets the next_proto member in s if found |
| @@ -2921,4 +2906,3 @@ ssl3_get_next_proto(SSL *s) | |||
| 2921 | 2906 | ||
| 2922 | return (1); | 2907 | return (1); |
| 2923 | } | 2908 | } |
| 2924 | # endif | ||
