aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2022-09-26 12:00:28 +0100
committerMatt Caswell <matt@openssl.org>2022-10-12 15:53:31 +0100
commitf93c0f546423eab65be3bc50a8cdfc3d5eb6b2e1 (patch)
tree4ea10cc5245be4d3f90ea0204b6f7507dcea37ec
parent435d88d70813825533c8789faa71c6287e0d43c9 (diff)
downloadopenssl-f93c0f546423eab65be3bc50a8cdfc3d5eb6b2e1.tar.gz
Remove an old TODO from the code
Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19343)
-rw-r--r--ssl/record/rec_layer_s3.c1
1 files changed, 0 insertions, 1 deletions
diff --git a/ssl/record/rec_layer_s3.c b/ssl/record/rec_layer_s3.c
index d77acde232..aa81d589b5 100644
--- a/ssl/record/rec_layer_s3.c
+++ b/ssl/record/rec_layer_s3.c
@@ -1226,7 +1226,6 @@ int ssl_set_new_record_layer(SSL_CONNECTION *s, int version,
* using the early keys. A server also needs to worry about rejected early
* data that might arrive when the handshake keys are in force.
*/
- /* TODO(RECLAYER): Check this when doing the "write" record layer */
if (s->server && direction == OSSL_RECORD_DIRECTION_READ) {
use_early_data = (level == OSSL_RECORD_PROTECTION_LEVEL_EARLY
|| level == OSSL_RECORD_PROTECTION_LEVEL_HANDSHAKE);