Commit 583c2aa3 authored by Rob Stradling's avatar Rob Stradling
Browse files

Tidy up comments.

parent 9b2b6191
Loading
Loading
Loading
Loading
+2 −2
Original line number Diff line number Diff line
@@ -2214,8 +2214,8 @@ void ssl3_clear(SSL *s)
#ifndef OPENSSL_NO_TLSEXT
#ifndef OPENSSL_NO_EC
	s->s3->is_probably_safari = 0;
#endif /* OPENSSL_NO_EC */
#endif /* OPENSSL_NO_TLSEXT */
#endif /* !OPENSSL_NO_EC */
#endif /* !OPENSSL_NO_TLSEXT */

	rp = s->s3->rbuf.buf;
	wp = s->s3->wbuf.buf;
+2 −2
Original line number Diff line number Diff line
@@ -530,8 +530,8 @@ typedef struct ssl3_state_st
	 * running on OS X 10.6 or newer. We wish to know this because Safari
	 * on 10.8 .. 10.8.3 has broken ECDHE-ECDSA support. */
	char is_probably_safari;
#endif	/* OPENSSL_NO_EC */
#endif	/* OPENSSL_NO_TLSEXT */
#endif /* !OPENSSL_NO_EC */
#endif /* !OPENSSL_NO_TLSEXT */

	} SSL3_STATE;

+2 −2
Original line number Diff line number Diff line
@@ -706,7 +706,7 @@ static void ssl_check_for_safari(SSL *s, const unsigned char *data, const unsign

	s->s3->is_probably_safari = 1;
}
#endif	/* OPENSSL_NO_EC */
#endif /* !OPENSSL_NO_EC */

int ssl_parse_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n, int *al)
	{
@@ -722,7 +722,7 @@ int ssl_parse_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *d, in
#ifndef OPENSSL_NO_EC
	if (s->options & SSL_OP_SAFARI_ECDHE_ECDSA_BUG)
		ssl_check_for_safari(s, data, d, n);
#endif	/* OPENSSL_NO_EC */
#endif /* !OPENSSL_NO_EC */

	if (data >= (d+n-2))
		goto ri_check;