diff options
author | tedu <> | 2014-04-17 21:41:12 +0000 |
---|---|---|
committer | tedu <> | 2014-04-17 21:41:12 +0000 |
commit | 1936e2003fe91f2742c69504d76f935e6cadee40 (patch) | |
tree | 65132e9075fbf29e382f4123bd9fd7f429b552e5 /src | |
parent | 153e0cd77b7a56682f71acec88a0c318e197fcb3 (diff) | |
download | openbsd-1936e2003fe91f2742c69504d76f935e6cadee40.tar.gz openbsd-1936e2003fe91f2742c69504d76f935e6cadee40.tar.bz2 openbsd-1936e2003fe91f2742c69504d76f935e6cadee40.zip |
no longer need to fool emacs indentation and other if (0) oddities.
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libssl/d1_clnt.c | 5 | ||||
-rw-r--r-- | src/lib/libssl/s3_clnt.c | 8 | ||||
-rw-r--r-- | src/lib/libssl/src/ssl/d1_clnt.c | 5 | ||||
-rw-r--r-- | src/lib/libssl/src/ssl/s3_clnt.c | 8 | ||||
-rw-r--r-- | src/lib/libssl/src/ssl/ssltest.c | 4 |
5 files changed, 7 insertions, 23 deletions
diff --git a/src/lib/libssl/d1_clnt.c b/src/lib/libssl/d1_clnt.c index 1ad65ba541..b919baf7fa 100644 --- a/src/lib/libssl/d1_clnt.c +++ b/src/lib/libssl/d1_clnt.c | |||
@@ -945,10 +945,7 @@ dtls1_send_client_key_exchange(SSL *s) | |||
945 | 945 | ||
946 | alg_k = s->s3->tmp.new_cipher->algorithm_mkey; | 946 | alg_k = s->s3->tmp.new_cipher->algorithm_mkey; |
947 | 947 | ||
948 | /* Fool emacs indentation */ | 948 | if (alg_k & SSL_kRSA) { |
949 | if (0) { | ||
950 | } | ||
951 | else if (alg_k & SSL_kRSA) { | ||
952 | RSA *rsa; | 949 | RSA *rsa; |
953 | unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; | 950 | unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; |
954 | 951 | ||
diff --git a/src/lib/libssl/s3_clnt.c b/src/lib/libssl/s3_clnt.c index 52e2174f6b..abae12a8d1 100644 --- a/src/lib/libssl/s3_clnt.c +++ b/src/lib/libssl/s3_clnt.c | |||
@@ -1535,8 +1535,7 @@ ssl3_get_key_exchange(SSL *s) | |||
1535 | * the use of DSA to sign ECParameters in the server | 1535 | * the use of DSA to sign ECParameters in the server |
1536 | * key exchange message. We do support RSA and ECDSA. | 1536 | * key exchange message. We do support RSA and ECDSA. |
1537 | */ | 1537 | */ |
1538 | if (0); | 1538 | if (alg_a & SSL_aRSA) |
1539 | else if (alg_a & SSL_aRSA) | ||
1540 | pkey = X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); | 1539 | pkey = X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); |
1541 | #ifndef OPENSSL_NO_ECDSA | 1540 | #ifndef OPENSSL_NO_ECDSA |
1542 | else if (alg_a & SSL_aECDSA) | 1541 | else if (alg_a & SSL_aECDSA) |
@@ -2031,10 +2030,7 @@ ssl3_send_client_key_exchange(SSL *s) | |||
2031 | 2030 | ||
2032 | alg_k = s->s3->tmp.new_cipher->algorithm_mkey; | 2031 | alg_k = s->s3->tmp.new_cipher->algorithm_mkey; |
2033 | 2032 | ||
2034 | /* Fool emacs indentation */ | 2033 | if (alg_k & SSL_kRSA) { |
2035 | if (0) { | ||
2036 | } | ||
2037 | else if (alg_k & SSL_kRSA) { | ||
2038 | RSA *rsa; | 2034 | RSA *rsa; |
2039 | unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; | 2035 | unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; |
2040 | 2036 | ||
diff --git a/src/lib/libssl/src/ssl/d1_clnt.c b/src/lib/libssl/src/ssl/d1_clnt.c index 1ad65ba541..b919baf7fa 100644 --- a/src/lib/libssl/src/ssl/d1_clnt.c +++ b/src/lib/libssl/src/ssl/d1_clnt.c | |||
@@ -945,10 +945,7 @@ dtls1_send_client_key_exchange(SSL *s) | |||
945 | 945 | ||
946 | alg_k = s->s3->tmp.new_cipher->algorithm_mkey; | 946 | alg_k = s->s3->tmp.new_cipher->algorithm_mkey; |
947 | 947 | ||
948 | /* Fool emacs indentation */ | 948 | if (alg_k & SSL_kRSA) { |
949 | if (0) { | ||
950 | } | ||
951 | else if (alg_k & SSL_kRSA) { | ||
952 | RSA *rsa; | 949 | RSA *rsa; |
953 | unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; | 950 | unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; |
954 | 951 | ||
diff --git a/src/lib/libssl/src/ssl/s3_clnt.c b/src/lib/libssl/src/ssl/s3_clnt.c index 52e2174f6b..abae12a8d1 100644 --- a/src/lib/libssl/src/ssl/s3_clnt.c +++ b/src/lib/libssl/src/ssl/s3_clnt.c | |||
@@ -1535,8 +1535,7 @@ ssl3_get_key_exchange(SSL *s) | |||
1535 | * the use of DSA to sign ECParameters in the server | 1535 | * the use of DSA to sign ECParameters in the server |
1536 | * key exchange message. We do support RSA and ECDSA. | 1536 | * key exchange message. We do support RSA and ECDSA. |
1537 | */ | 1537 | */ |
1538 | if (0); | 1538 | if (alg_a & SSL_aRSA) |
1539 | else if (alg_a & SSL_aRSA) | ||
1540 | pkey = X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); | 1539 | pkey = X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509); |
1541 | #ifndef OPENSSL_NO_ECDSA | 1540 | #ifndef OPENSSL_NO_ECDSA |
1542 | else if (alg_a & SSL_aECDSA) | 1541 | else if (alg_a & SSL_aECDSA) |
@@ -2031,10 +2030,7 @@ ssl3_send_client_key_exchange(SSL *s) | |||
2031 | 2030 | ||
2032 | alg_k = s->s3->tmp.new_cipher->algorithm_mkey; | 2031 | alg_k = s->s3->tmp.new_cipher->algorithm_mkey; |
2033 | 2032 | ||
2034 | /* Fool emacs indentation */ | 2033 | if (alg_k & SSL_kRSA) { |
2035 | if (0) { | ||
2036 | } | ||
2037 | else if (alg_k & SSL_kRSA) { | ||
2038 | RSA *rsa; | 2034 | RSA *rsa; |
2039 | unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; | 2035 | unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; |
2040 | 2036 | ||
diff --git a/src/lib/libssl/src/ssl/ssltest.c b/src/lib/libssl/src/ssl/ssltest.c index 1ce08c957d..700189db43 100644 --- a/src/lib/libssl/src/ssl/ssltest.c +++ b/src/lib/libssl/src/ssl/ssltest.c | |||
@@ -355,9 +355,7 @@ print_details(SSL *c_ssl, const char *prefix) | |||
355 | if (cert != NULL) { | 355 | if (cert != NULL) { |
356 | EVP_PKEY *pkey = X509_get_pubkey(cert); | 356 | EVP_PKEY *pkey = X509_get_pubkey(cert); |
357 | if (pkey != NULL) { | 357 | if (pkey != NULL) { |
358 | if (0) | 358 | if (pkey->type == EVP_PKEY_RSA && |
359 | ; | ||
360 | else if (pkey->type == EVP_PKEY_RSA && | ||
361 | pkey->pkey.rsa != NULL && | 359 | pkey->pkey.rsa != NULL && |
362 | pkey->pkey.rsa->n != NULL) { | 360 | pkey->pkey.rsa->n != NULL) { |
363 | BIO_printf(bio_stdout, ", %d bit RSA", | 361 | BIO_printf(bio_stdout, ", %d bit RSA", |