summaryrefslogtreecommitdiff
path: root/src/lib/libssl/t1_reneg.c
diff options
context:
space:
mode:
authorjsing <>2014-05-25 16:23:10 +0000
committerjsing <>2014-05-25 16:23:10 +0000
commit20aefbf0b86724bbf87cb9ceb36defa64e4691ab (patch)
tree3f1db49f0679d8ac712ededb86f1b538423eea91 /src/lib/libssl/t1_reneg.c
parent23deca1ca2f60559c720fd71c5ac72fb2c862771 (diff)
downloadopenbsd-20aefbf0b86724bbf87cb9ceb36defa64e4691ab.tar.gz
openbsd-20aefbf0b86724bbf87cb9ceb36defa64e4691ab.tar.bz2
openbsd-20aefbf0b86724bbf87cb9ceb36defa64e4691ab.zip
Remove TLS_DEBUG, SSL_DEBUG, CIPHER_DEBUG and OPENSSL_RI_DEBUG. Much of
this is sporadic, hacked up and can easily be put back in an improved form should we ever need it. ok miod@
Diffstat (limited to 'src/lib/libssl/t1_reneg.c')
-rw-r--r--src/lib/libssl/t1_reneg.c16
1 files changed, 0 insertions, 16 deletions
diff --git a/src/lib/libssl/t1_reneg.c b/src/lib/libssl/t1_reneg.c
index e08e7fedc6..5f96e1fa7e 100644
--- a/src/lib/libssl/t1_reneg.c
+++ b/src/lib/libssl/t1_reneg.c
@@ -131,10 +131,6 @@ ssl_add_clienthello_renegotiate_ext(SSL *s, unsigned char *p, int *len,
131 memcpy(p, s->s3->previous_client_finished, 131 memcpy(p, s->s3->previous_client_finished,
132 s->s3->previous_client_finished_len); 132 s->s3->previous_client_finished_len);
133 133
134#ifdef OPENSSL_RI_DEBUG
135 fprintf(stderr, "%s RI extension sent by client\n",
136 s->s3->previous_client_finished_len ? "Non-empty" : "Empty");
137#endif
138 } 134 }
139 135
140 *len = s->s3->previous_client_finished_len + 1; 136 *len = s->s3->previous_client_finished_len + 1;
@@ -184,10 +180,6 @@ ssl_parse_clienthello_renegotiate_ext(SSL *s, unsigned char *d, int len,
184 return 0; 180 return 0;
185 } 181 }
186 182
187#ifdef OPENSSL_RI_DEBUG
188 fprintf(stderr, "%s RI extension received by server\n",
189 ilen ? "Non-empty" : "Empty");
190#endif
191 183
192 s->s3->send_connection_binding = 1; 184 s->s3->send_connection_binding = 1;
193 185
@@ -219,10 +211,6 @@ ssl_add_serverhello_renegotiate_ext(SSL *s, unsigned char *p, int *len,
219 memcpy(p, s->s3->previous_server_finished, 211 memcpy(p, s->s3->previous_server_finished,
220 s->s3->previous_server_finished_len); 212 s->s3->previous_server_finished_len);
221 213
222#ifdef OPENSSL_RI_DEBUG
223 fprintf(stderr, "%s RI extension sent by server\n",
224 s->s3->previous_client_finished_len ? "Non-empty" : "Empty");
225#endif
226 } 214 }
227 215
228 *len = s->s3->previous_client_finished_len + 216 *len = s->s3->previous_client_finished_len +
@@ -288,10 +276,6 @@ ssl_parse_serverhello_renegotiate_ext(SSL *s, unsigned char *d, int len,
288 return 0; 276 return 0;
289 } 277 }
290 278
291#ifdef OPENSSL_RI_DEBUG
292 fprintf(stderr, "%s RI extension received by client\n",
293 ilen ? "Non-empty" : "Empty");
294#endif
295 s->s3->send_connection_binding = 1; 279 s->s3->send_connection_binding = 1;
296 280
297 return 1; 281 return 1;