diff options
author | jsing <> | 2014-12-14 14:34:43 +0000 |
---|---|---|
committer | jsing <> | 2014-12-14 14:34:43 +0000 |
commit | b303e332970ffd772a791a3a52b851697dd671bc (patch) | |
tree | d5225f7d83af44c76a58e948450d586798882cf9 /src/lib/libssl/s3_srvr.c | |
parent | 8c353d1cc8300944b77e9bee6d4be75bd546eec1 (diff) | |
download | openbsd-b303e332970ffd772a791a3a52b851697dd671bc.tar.gz openbsd-b303e332970ffd772a791a3a52b851697dd671bc.tar.bz2 openbsd-b303e332970ffd772a791a3a52b851697dd671bc.zip |
unifdef OPENSSL_NO_NEXTPROTONEG, which is one of the last standing #ifndef
mazes in libssl. NPN is being replaced by ALPN, however it is still going
to be around for a while yet.
ok miod@
Diffstat (limited to 'src/lib/libssl/s3_srvr.c')
-rw-r--r-- | src/lib/libssl/s3_srvr.c | 18 |
1 files changed, 1 insertions, 17 deletions
diff --git a/src/lib/libssl/s3_srvr.c b/src/lib/libssl/s3_srvr.c index 645caf4bc9..783b1df782 100644 --- a/src/lib/libssl/s3_srvr.c +++ b/src/lib/libssl/s3_srvr.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s3_srvr.c,v 1.93 2014/12/10 15:43:31 jsing Exp $ */ | 1 | /* $OpenBSD: s3_srvr.c,v 1.94 2014/12/14 14:34:43 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -537,14 +537,10 @@ ssl3_accept(SSL *s) | |||
537 | * the client uses its key from the certificate | 537 | * the client uses its key from the certificate |
538 | * for key exchange. | 538 | * for key exchange. |
539 | */ | 539 | */ |
540 | #ifdef OPENSSL_NO_NEXTPROTONEG | ||
541 | s->state = SSL3_ST_SR_FINISHED_A; | ||
542 | #else | ||
543 | if (s->s3->next_proto_neg_seen) | 540 | if (s->s3->next_proto_neg_seen) |
544 | s->state = SSL3_ST_SR_NEXT_PROTO_A; | 541 | s->state = SSL3_ST_SR_NEXT_PROTO_A; |
545 | else | 542 | else |
546 | s->state = SSL3_ST_SR_FINISHED_A; | 543 | s->state = SSL3_ST_SR_FINISHED_A; |
547 | #endif | ||
548 | s->init_num = 0; | 544 | s->init_num = 0; |
549 | } else if (SSL_USE_SIGALGS(s) || (alg_k & SSL_kGOST)) { | 545 | } else if (SSL_USE_SIGALGS(s) || (alg_k & SSL_kGOST)) { |
550 | s->state = SSL3_ST_SR_CERT_VRFY_A; | 546 | s->state = SSL3_ST_SR_CERT_VRFY_A; |
@@ -609,18 +605,13 @@ ssl3_accept(SSL *s) | |||
609 | if (ret <= 0) | 605 | if (ret <= 0) |
610 | goto end; | 606 | goto end; |
611 | 607 | ||
612 | #ifdef OPENSSL_NO_NEXTPROTONEG | ||
613 | s->state = SSL3_ST_SR_FINISHED_A; | ||
614 | #else | ||
615 | if (s->s3->next_proto_neg_seen) | 608 | if (s->s3->next_proto_neg_seen) |
616 | s->state = SSL3_ST_SR_NEXT_PROTO_A; | 609 | s->state = SSL3_ST_SR_NEXT_PROTO_A; |
617 | else | 610 | else |
618 | s->state = SSL3_ST_SR_FINISHED_A; | 611 | s->state = SSL3_ST_SR_FINISHED_A; |
619 | #endif | ||
620 | s->init_num = 0; | 612 | s->init_num = 0; |
621 | break; | 613 | break; |
622 | 614 | ||
623 | #ifndef OPENSSL_NO_NEXTPROTONEG | ||
624 | case SSL3_ST_SR_NEXT_PROTO_A: | 615 | case SSL3_ST_SR_NEXT_PROTO_A: |
625 | case SSL3_ST_SR_NEXT_PROTO_B: | 616 | case SSL3_ST_SR_NEXT_PROTO_B: |
626 | ret = ssl3_get_next_proto(s); | 617 | ret = ssl3_get_next_proto(s); |
@@ -629,7 +620,6 @@ ssl3_accept(SSL *s) | |||
629 | s->init_num = 0; | 620 | s->init_num = 0; |
630 | s->state = SSL3_ST_SR_FINISHED_A; | 621 | s->state = SSL3_ST_SR_FINISHED_A; |
631 | break; | 622 | break; |
632 | #endif | ||
633 | 623 | ||
634 | case SSL3_ST_SR_FINISHED_A: | 624 | case SSL3_ST_SR_FINISHED_A: |
635 | case SSL3_ST_SR_FINISHED_B: | 625 | case SSL3_ST_SR_FINISHED_B: |
@@ -701,9 +691,6 @@ ssl3_accept(SSL *s) | |||
701 | goto end; | 691 | goto end; |
702 | s->state = SSL3_ST_SW_FLUSH; | 692 | s->state = SSL3_ST_SW_FLUSH; |
703 | if (s->hit) { | 693 | if (s->hit) { |
704 | #ifdef OPENSSL_NO_NEXTPROTONEG | ||
705 | s->s3->tmp.next_state = SSL3_ST_SR_FINISHED_A; | ||
706 | #else | ||
707 | if (s->s3->next_proto_neg_seen) { | 694 | if (s->s3->next_proto_neg_seen) { |
708 | s->s3->flags |= SSL3_FLAGS_CCS_OK; | 695 | s->s3->flags |= SSL3_FLAGS_CCS_OK; |
709 | s->s3->tmp.next_state = | 696 | s->s3->tmp.next_state = |
@@ -711,7 +698,6 @@ ssl3_accept(SSL *s) | |||
711 | } else | 698 | } else |
712 | s->s3->tmp.next_state = | 699 | s->s3->tmp.next_state = |
713 | SSL3_ST_SR_FINISHED_A; | 700 | SSL3_ST_SR_FINISHED_A; |
714 | #endif | ||
715 | } else | 701 | } else |
716 | s->s3->tmp.next_state = SSL_ST_OK; | 702 | s->s3->tmp.next_state = SSL_ST_OK; |
717 | s->init_num = 0; | 703 | s->init_num = 0; |
@@ -2850,7 +2836,6 @@ ssl3_send_cert_status(SSL *s) | |||
2850 | return (ssl3_do_write(s, SSL3_RT_HANDSHAKE)); | 2836 | return (ssl3_do_write(s, SSL3_RT_HANDSHAKE)); |
2851 | } | 2837 | } |
2852 | 2838 | ||
2853 | # ifndef OPENSSL_NO_NEXTPROTONEG | ||
2854 | /* | 2839 | /* |
2855 | * ssl3_get_next_proto reads a Next Protocol Negotiation handshake message. | 2840 | * ssl3_get_next_proto reads a Next Protocol Negotiation handshake message. |
2856 | * It sets the next_proto member in s if found | 2841 | * It sets the next_proto member in s if found |
@@ -2921,4 +2906,3 @@ ssl3_get_next_proto(SSL *s) | |||
2921 | 2906 | ||
2922 | return (1); | 2907 | return (1); |
2923 | } | 2908 | } |
2924 | # endif | ||