diff options
author | jsing <> | 2014-05-25 13:32:51 +0000 |
---|---|---|
committer | jsing <> | 2014-05-25 13:32:51 +0000 |
commit | 4fd1d97e5d12fe84156713cfc55e8864fe0d98c0 (patch) | |
tree | 64dfa9da2f1157db7aaca5ab143b3047a312812b /src/lib/libssl/ssl_ciph.c | |
parent | fc3ae41e6c3f587c173aca34af47208c06c01668 (diff) | |
download | openbsd-4fd1d97e5d12fe84156713cfc55e8864fe0d98c0.tar.gz openbsd-4fd1d97e5d12fe84156713cfc55e8864fe0d98c0.tar.bz2 openbsd-4fd1d97e5d12fe84156713cfc55e8864fe0d98c0.zip |
Turn off MemCheck_on and MemCheck_off. These calls are pointless since the
crypto memory debugging code has been castrated.
ok miod@ "kill it" beck@
Diffstat (limited to 'src/lib/libssl/ssl_ciph.c')
-rw-r--r-- | src/lib/libssl/ssl_ciph.c | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/src/lib/libssl/ssl_ciph.c b/src/lib/libssl/ssl_ciph.c index bd939b7563..22ed70b30b 100644 --- a/src/lib/libssl/ssl_ciph.c +++ b/src/lib/libssl/ssl_ciph.c | |||
@@ -453,7 +453,6 @@ load_builtin_compressions(void) | |||
453 | if (ssl_comp_methods == NULL) { | 453 | if (ssl_comp_methods == NULL) { |
454 | SSL_COMP *comp = NULL; | 454 | SSL_COMP *comp = NULL; |
455 | 455 | ||
456 | MemCheck_off(); | ||
457 | ssl_comp_methods = sk_SSL_COMP_new(sk_comp_cmp); | 456 | ssl_comp_methods = sk_SSL_COMP_new(sk_comp_cmp); |
458 | if (ssl_comp_methods != NULL) { | 457 | if (ssl_comp_methods != NULL) { |
459 | comp = malloc(sizeof(SSL_COMP)); | 458 | comp = malloc(sizeof(SSL_COMP)); |
@@ -470,7 +469,6 @@ load_builtin_compressions(void) | |||
470 | } | 469 | } |
471 | sk_SSL_COMP_sort(ssl_comp_methods); | 470 | sk_SSL_COMP_sort(ssl_comp_methods); |
472 | } | 471 | } |
473 | MemCheck_on(); | ||
474 | } | 472 | } |
475 | } | 473 | } |
476 | 474 | ||