Loading ssl/s3_lib.c +2 −2 Original line number Diff line number Diff line Loading @@ -3068,8 +3068,8 @@ void ssl3_clear(SSL *s) s->s3->tlsext_custom_types_count = 0; #ifndef OPENSSL_NO_EC s->s3->is_probably_safari = 0; #endif /* OPENSSL_NO_EC */ #endif /* OPENSSL_NO_TLSEXT */ #endif /* !OPENSSL_NO_EC */ #endif /* !OPENSSL_NO_TLSEXT */ rp = s->s3->rbuf.buf; wp = s->s3->wbuf.buf; Loading ssl/ssl3.h +2 −2 Original line number Diff line number Diff line Loading @@ -586,9 +586,9 @@ typedef struct ssl3_state_st * running on OS X 10.6 or newer. We wish to know this because Safari * on 10.8 .. 10.8.3 has broken ECDHE-ECDSA support. */ char is_probably_safari; #endif /* OPENSSL_NO_EC */ #endif /* !OPENSSL_NO_EC */ #endif /* OPENSSL_NO_TLSEXT */ #endif /* !OPENSSL_NO_TLSEXT */ } SSL3_STATE; #endif Loading ssl/t1_lib.c +2 −2 Original line number Diff line number Diff line Loading @@ -1843,7 +1843,7 @@ static void ssl_check_for_safari(SSL *s, const unsigned char *data, const unsign s->s3->is_probably_safari = 1; } #endif /* OPENSSL_NO_EC */ #endif /* !OPENSSL_NO_EC */ static int ssl_scan_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n, int *al) { Loading @@ -1868,7 +1868,7 @@ static int ssl_scan_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char #ifndef OPENSSL_NO_EC if (s->options & SSL_OP_SAFARI_ECDHE_ECDSA_BUG) ssl_check_for_safari(s, data, d, n); #endif /* OPENSSL_NO_EC */ #endif /* !OPENSSL_NO_EC */ /* Clear any signature algorithms extension received */ if (s->cert->peer_sigalgs) Loading Loading
ssl/s3_lib.c +2 −2 Original line number Diff line number Diff line Loading @@ -3068,8 +3068,8 @@ void ssl3_clear(SSL *s) s->s3->tlsext_custom_types_count = 0; #ifndef OPENSSL_NO_EC s->s3->is_probably_safari = 0; #endif /* OPENSSL_NO_EC */ #endif /* OPENSSL_NO_TLSEXT */ #endif /* !OPENSSL_NO_EC */ #endif /* !OPENSSL_NO_TLSEXT */ rp = s->s3->rbuf.buf; wp = s->s3->wbuf.buf; Loading
ssl/ssl3.h +2 −2 Original line number Diff line number Diff line Loading @@ -586,9 +586,9 @@ typedef struct ssl3_state_st * running on OS X 10.6 or newer. We wish to know this because Safari * on 10.8 .. 10.8.3 has broken ECDHE-ECDSA support. */ char is_probably_safari; #endif /* OPENSSL_NO_EC */ #endif /* !OPENSSL_NO_EC */ #endif /* OPENSSL_NO_TLSEXT */ #endif /* !OPENSSL_NO_TLSEXT */ } SSL3_STATE; #endif Loading
ssl/t1_lib.c +2 −2 Original line number Diff line number Diff line Loading @@ -1843,7 +1843,7 @@ static void ssl_check_for_safari(SSL *s, const unsigned char *data, const unsign s->s3->is_probably_safari = 1; } #endif /* OPENSSL_NO_EC */ #endif /* !OPENSSL_NO_EC */ static int ssl_scan_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n, int *al) { Loading @@ -1868,7 +1868,7 @@ static int ssl_scan_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char #ifndef OPENSSL_NO_EC if (s->options & SSL_OP_SAFARI_ECDHE_ECDSA_BUG) ssl_check_for_safari(s, data, d, n); #endif /* OPENSSL_NO_EC */ #endif /* !OPENSSL_NO_EC */ /* Clear any signature algorithms extension received */ if (s->cert->peer_sigalgs) Loading