Tidy up comments.

This commit is contained in:
Rob Stradling 2013-09-10 11:50:05 +01:00 committed by Ben Laurie
parent 6a0b803fc0
commit 9409e18179
3 changed files with 6 additions and 6 deletions

View file

@ -3068,8 +3068,8 @@ void ssl3_clear(SSL *s)
s->s3->tlsext_custom_types_count = 0;
#ifndef OPENSSL_NO_EC
s->s3->is_probably_safari = 0;
#endif /* OPENSSL_NO_EC */
#endif /* OPENSSL_NO_TLSEXT */
#endif /* !OPENSSL_NO_EC */
#endif /* !OPENSSL_NO_TLSEXT */
rp = s->s3->rbuf.buf;
wp = s->s3->wbuf.buf;

View file

@ -586,9 +586,9 @@ typedef struct ssl3_state_st
* running on OS X 10.6 or newer. We wish to know this because Safari
* on 10.8 .. 10.8.3 has broken ECDHE-ECDSA support. */
char is_probably_safari;
#endif /* OPENSSL_NO_EC */
#endif /* !OPENSSL_NO_EC */
#endif /* OPENSSL_NO_TLSEXT */
#endif /* !OPENSSL_NO_TLSEXT */
} SSL3_STATE;
#endif

View file

@ -1843,7 +1843,7 @@ static void ssl_check_for_safari(SSL *s, const unsigned char *data, const unsign
s->s3->is_probably_safari = 1;
}
#endif /* OPENSSL_NO_EC */
#endif /* !OPENSSL_NO_EC */
static int ssl_scan_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n, int *al)
{
@ -1868,7 +1868,7 @@ static int ssl_scan_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char
#ifndef OPENSSL_NO_EC
if (s->options & SSL_OP_SAFARI_ECDHE_ECDSA_BUG)
ssl_check_for_safari(s, data, d, n);
#endif /* OPENSSL_NO_EC */
#endif /* !OPENSSL_NO_EC */
/* Clear any signature algorithms extension received */
if (s->cert->peer_sigalgs)