diff options
author | Rich Salz <rsalz@openssl.org> | 2015-02-06 10:52:12 -0500 |
---|---|---|
committer | Rich Salz <rsalz@openssl.org> | 2015-02-06 10:52:12 -0500 |
commit | 9e9858d1cf28e39cfd214b5c508188d5016728fd (patch) | |
tree | 60f08154ebe96d68e44af0bc309c283a4dc8666d /ssl/s3_clnt.c | |
parent | 5b18d3025c1c1d36be8f81f137265b46da58f881 (diff) | |
download | openssl-9e9858d1cf28e39cfd214b5c508188d5016728fd.tar.gz |
dead code cleanup: #if 0 in ssl
I left many "#if 0" lines, usually because I thought we would
probably want to revisit them later, or because they provided
some useful internal documentation tips.
Reviewed-by: Andy Polyakov <appro@openssl.org>
Diffstat (limited to 'ssl/s3_clnt.c')
-rw-r--r-- | ssl/s3_clnt.c | 28 |
1 files changed, 4 insertions, 24 deletions
diff --git a/ssl/s3_clnt.c b/ssl/s3_clnt.c index 4d7d05b608..1e437b2e1e 100644 --- a/ssl/s3_clnt.c +++ b/ssl/s3_clnt.c @@ -755,14 +755,8 @@ int ssl3_client_hello(SSL *s) * client_version in client hello and not resetting it to * the negotiated version. */ -#if 0 - *(p++) = s->version >> 8; - *(p++) = s->version & 0xff; - s->client_version = s->version; -#else *(p++) = s->client_version >> 8; *(p++) = s->client_version & 0xff; -#endif /* Random stuff */ memcpy(p, s->s3->client_random, SSL3_RANDOM_SIZE); @@ -1036,16 +1030,10 @@ int ssl3_get_server_hello(SSL *s) if (s->session->cipher) s->session->cipher_id = s->session->cipher->id; if (s->hit && (s->session->cipher_id != c->id)) { -/* Workaround is now obsolete */ -#if 0 - if (!(s->options & SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG)) -#endif - { - al = SSL_AD_ILLEGAL_PARAMETER; - SSLerr(SSL_F_SSL3_GET_SERVER_HELLO, - SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED); - goto f_err; - } + al = SSL_AD_ILLEGAL_PARAMETER; + SSLerr(SSL_F_SSL3_GET_SERVER_HELLO, + SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED); + goto f_err; } s->s3->tmp.new_cipher = c; /* @@ -2091,14 +2079,6 @@ int ssl3_get_certificate_request(SSL *s) /* get the CA RDNs */ n2s(p, llen); -#if 0 - { - FILE *out; - out = fopen("/tmp/vsign.der", "w"); - fwrite(p, 1, llen, out); - fclose(out); - } -#endif if ((unsigned long)(p - d + llen) != n) { ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_DECODE_ERROR); |