Tidy up comments.

This commit is contained in:
Rob Stradling 2013-09-10 12:25:57 +01:00 committed by Ben Laurie
parent 378341e192
commit cbf8123512
3 changed files with 6 additions and 6 deletions

View File

@ -3084,8 +3084,8 @@ void ssl3_clear(SSL *s)
s->s3->tlsext_custom_types_count = 0;
#ifndef OPENSSL_NO_EC
s->s3->is_probably_safari = 0;
#endif /* OPENSSL_NO_EC */
#endif /* OPENSSL_NO_TLSEXT */
#endif /* !OPENSSL_NO_EC */
#endif /* !OPENSSL_NO_TLSEXT */
rp = s->s3->rbuf.buf;
wp = s->s3->wbuf.buf;

View File

@ -590,9 +590,9 @@ typedef struct ssl3_state_st
* running on OS X 10.6 or newer. We wish to know this because Safari
* on 10.8 .. 10.8.3 has broken ECDHE-ECDSA support. */
char is_probably_safari;
#endif /* OPENSSL_NO_EC */
#endif /* !OPENSSL_NO_EC */
#endif /* OPENSSL_NO_TLSEXT */
#endif /* !OPENSSL_NO_TLSEXT */
} SSL3_STATE;
#endif

View File

@ -1893,7 +1893,7 @@ static void ssl_check_for_safari(SSL *s, const unsigned char *data, const unsign
s->s3->is_probably_safari = 1;
}
#endif /* OPENSSL_NO_EC */
#endif /* !OPENSSL_NO_EC */
static int ssl_scan_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n, int *al)
{
@ -1932,7 +1932,7 @@ static int ssl_scan_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char
#ifndef OPENSSL_NO_EC
if (s->options & SSL_OP_SAFARI_ECDHE_ECDSA_BUG)
ssl_check_for_safari(s, data, d, n);
#endif /* OPENSSL_NO_EC */
#endif /* !OPENSSL_NO_EC */
/* Clear any signature algorithms extension received */
if (s->cert->peer_sigalgs)