diff options
author | Matt Caswell <matt@openssl.org> | 2022-09-26 12:00:28 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2022-10-12 15:53:31 +0100 |
commit | f93c0f546423eab65be3bc50a8cdfc3d5eb6b2e1 (patch) | |
tree | 4ea10cc5245be4d3f90ea0204b6f7507dcea37ec | |
parent | 435d88d70813825533c8789faa71c6287e0d43c9 (diff) | |
download | openssl-f93c0f546423eab65be3bc50a8cdfc3d5eb6b2e1.tar.gz |
Remove an old TODO from the code
Reviewed-by: Hugo Landau <hlandau@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/19343)
-rw-r--r-- | ssl/record/rec_layer_s3.c | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/ssl/record/rec_layer_s3.c b/ssl/record/rec_layer_s3.c index d77acde232..aa81d589b5 100644 --- a/ssl/record/rec_layer_s3.c +++ b/ssl/record/rec_layer_s3.c @@ -1226,7 +1226,6 @@ int ssl_set_new_record_layer(SSL_CONNECTION *s, int version, * using the early keys. A server also needs to worry about rejected early * data that might arrive when the handshake keys are in force. */ - /* TODO(RECLAYER): Check this when doing the "write" record layer */ if (s->server && direction == OSSL_RECORD_DIRECTION_READ) { use_early_data = (level == OSSL_RECORD_PROTECTION_LEVEL_EARLY || level == OSSL_RECORD_PROTECTION_LEVEL_HANDSHAKE); |