summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authortedu <>2014-04-17 21:41:12 +0000
committertedu <>2014-04-17 21:41:12 +0000
commit1936e2003fe91f2742c69504d76f935e6cadee40 (patch)
tree65132e9075fbf29e382f4123bd9fd7f429b552e5 /src
parent153e0cd77b7a56682f71acec88a0c318e197fcb3 (diff)
downloadopenbsd-1936e2003fe91f2742c69504d76f935e6cadee40.tar.gz
openbsd-1936e2003fe91f2742c69504d76f935e6cadee40.tar.bz2
openbsd-1936e2003fe91f2742c69504d76f935e6cadee40.zip
no longer need to fool emacs indentation and other if (0) oddities.
Diffstat (limited to 'src')
-rw-r--r--src/lib/libssl/d1_clnt.c5
-rw-r--r--src/lib/libssl/s3_clnt.c8
-rw-r--r--src/lib/libssl/src/ssl/d1_clnt.c5
-rw-r--r--src/lib/libssl/src/ssl/s3_clnt.c8
-rw-r--r--src/lib/libssl/src/ssl/ssltest.c4
5 files changed, 7 insertions, 23 deletions
diff --git a/src/lib/libssl/d1_clnt.c b/src/lib/libssl/d1_clnt.c
index 1ad65ba541..b919baf7fa 100644
--- a/src/lib/libssl/d1_clnt.c
+++ b/src/lib/libssl/d1_clnt.c
@@ -945,10 +945,7 @@ dtls1_send_client_key_exchange(SSL *s)
945 945
946 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 946 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
947 947
948 /* Fool emacs indentation */ 948 if (alg_k & SSL_kRSA) {
949 if (0) {
950 }
951 else if (alg_k & SSL_kRSA) {
952 RSA *rsa; 949 RSA *rsa;
953 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; 950 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH];
954 951
diff --git a/src/lib/libssl/s3_clnt.c b/src/lib/libssl/s3_clnt.c
index 52e2174f6b..abae12a8d1 100644
--- a/src/lib/libssl/s3_clnt.c
+++ b/src/lib/libssl/s3_clnt.c
@@ -1535,8 +1535,7 @@ ssl3_get_key_exchange(SSL *s)
1535 * the use of DSA to sign ECParameters in the server 1535 * the use of DSA to sign ECParameters in the server
1536 * key exchange message. We do support RSA and ECDSA. 1536 * key exchange message. We do support RSA and ECDSA.
1537 */ 1537 */
1538 if (0); 1538 if (alg_a & SSL_aRSA)
1539 else if (alg_a & SSL_aRSA)
1540 pkey = X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); 1539 pkey = X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509);
1541#ifndef OPENSSL_NO_ECDSA 1540#ifndef OPENSSL_NO_ECDSA
1542 else if (alg_a & SSL_aECDSA) 1541 else if (alg_a & SSL_aECDSA)
@@ -2031,10 +2030,7 @@ ssl3_send_client_key_exchange(SSL *s)
2031 2030
2032 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 2031 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
2033 2032
2034 /* Fool emacs indentation */ 2033 if (alg_k & SSL_kRSA) {
2035 if (0) {
2036 }
2037 else if (alg_k & SSL_kRSA) {
2038 RSA *rsa; 2034 RSA *rsa;
2039 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; 2035 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH];
2040 2036
diff --git a/src/lib/libssl/src/ssl/d1_clnt.c b/src/lib/libssl/src/ssl/d1_clnt.c
index 1ad65ba541..b919baf7fa 100644
--- a/src/lib/libssl/src/ssl/d1_clnt.c
+++ b/src/lib/libssl/src/ssl/d1_clnt.c
@@ -945,10 +945,7 @@ dtls1_send_client_key_exchange(SSL *s)
945 945
946 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 946 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
947 947
948 /* Fool emacs indentation */ 948 if (alg_k & SSL_kRSA) {
949 if (0) {
950 }
951 else if (alg_k & SSL_kRSA) {
952 RSA *rsa; 949 RSA *rsa;
953 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; 950 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH];
954 951
diff --git a/src/lib/libssl/src/ssl/s3_clnt.c b/src/lib/libssl/src/ssl/s3_clnt.c
index 52e2174f6b..abae12a8d1 100644
--- a/src/lib/libssl/src/ssl/s3_clnt.c
+++ b/src/lib/libssl/src/ssl/s3_clnt.c
@@ -1535,8 +1535,7 @@ ssl3_get_key_exchange(SSL *s)
1535 * the use of DSA to sign ECParameters in the server 1535 * the use of DSA to sign ECParameters in the server
1536 * key exchange message. We do support RSA and ECDSA. 1536 * key exchange message. We do support RSA and ECDSA.
1537 */ 1537 */
1538 if (0); 1538 if (alg_a & SSL_aRSA)
1539 else if (alg_a & SSL_aRSA)
1540 pkey = X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); 1539 pkey = X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509);
1541#ifndef OPENSSL_NO_ECDSA 1540#ifndef OPENSSL_NO_ECDSA
1542 else if (alg_a & SSL_aECDSA) 1541 else if (alg_a & SSL_aECDSA)
@@ -2031,10 +2030,7 @@ ssl3_send_client_key_exchange(SSL *s)
2031 2030
2032 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 2031 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
2033 2032
2034 /* Fool emacs indentation */ 2033 if (alg_k & SSL_kRSA) {
2035 if (0) {
2036 }
2037 else if (alg_k & SSL_kRSA) {
2038 RSA *rsa; 2034 RSA *rsa;
2039 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; 2035 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH];
2040 2036
diff --git a/src/lib/libssl/src/ssl/ssltest.c b/src/lib/libssl/src/ssl/ssltest.c
index 1ce08c957d..700189db43 100644
--- a/src/lib/libssl/src/ssl/ssltest.c
+++ b/src/lib/libssl/src/ssl/ssltest.c
@@ -355,9 +355,7 @@ print_details(SSL *c_ssl, const char *prefix)
355 if (cert != NULL) { 355 if (cert != NULL) {
356 EVP_PKEY *pkey = X509_get_pubkey(cert); 356 EVP_PKEY *pkey = X509_get_pubkey(cert);
357 if (pkey != NULL) { 357 if (pkey != NULL) {
358 if (0) 358 if (pkey->type == EVP_PKEY_RSA &&
359;
360 else if (pkey->type == EVP_PKEY_RSA &&
361 pkey->pkey.rsa != NULL && 359 pkey->pkey.rsa != NULL &&
362 pkey->pkey.rsa->n != NULL) { 360 pkey->pkey.rsa->n != NULL) {
363 BIO_printf(bio_stdout, ", %d bit RSA", 361 BIO_printf(bio_stdout, ", %d bit RSA",