summaryrefslogtreecommitdiffstats
path: root/lib/libssl/src/ssl/d1_clnt.c
diff options
context:
space:
mode:
authorjsing <jsing@openbsd.org>2014-08-10 14:42:55 +0000
committerjsing <jsing@openbsd.org>2014-08-10 14:42:55 +0000
commit3e6620b05005703104bc76bb7ab704a725e99897 (patch)
tree43645363ec33870f6339e73eec118c9ae7acba82 /lib/libssl/src/ssl/d1_clnt.c
parentAsk for the descriptor size corresponding to the number of ports present (diff)
downloadwireguard-openbsd-3e6620b05005703104bc76bb7ab704a725e99897.tar.xz
wireguard-openbsd-3e6620b05005703104bc76bb7ab704a725e99897.zip
Since we no longer need to support SSLv2-style cipher lists, start
unravelling the maze of function pointers and callbacks by directly calling ssl3_{get,put}_cipher_by_char() and removing the ssl_{get,put}_cipher_by_char macros. Prompted by similar changes in boringssl. ok guenther.
Diffstat (limited to 'lib/libssl/src/ssl/d1_clnt.c')
-rw-r--r--lib/libssl/src/ssl/d1_clnt.c6
1 files changed, 2 insertions, 4 deletions
diff --git a/lib/libssl/src/ssl/d1_clnt.c b/lib/libssl/src/ssl/d1_clnt.c
index c9ec32173bd..471871ff465 100644
--- a/lib/libssl/src/ssl/d1_clnt.c
+++ b/lib/libssl/src/ssl/d1_clnt.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: d1_clnt.c,v 1.33 2014/08/07 20:02:23 miod Exp $ */
+/* $OpenBSD: d1_clnt.c,v 1.34 2014/08/10 14:42:55 jsing Exp $ */
/*
* DTLS implementation written by Nagendra Modadugu
* (nagendra@cs.stanford.edu) for the OpenSSL project 2005.
@@ -145,8 +145,6 @@ const SSL_METHOD DTLSv1_client_method_data = {
.ssl_dispatch_alert = dtls1_dispatch_alert,
.ssl_ctrl = dtls1_ctrl,
.ssl_ctx_ctrl = ssl3_ctx_ctrl,
- .get_cipher_by_char = ssl3_get_cipher_by_char,
- .put_cipher_by_char = ssl3_put_cipher_by_char,
.ssl_pending = ssl3_pending,
.num_ciphers = ssl3_num_ciphers,
.get_cipher = dtls1_get_cipher,
@@ -820,7 +818,7 @@ dtls1_client_hello(SSL *s)
p += s->d1->cookie_len;
/* Ciphers supported */
- i = ssl_cipher_list_to_bytes(s, SSL_get_ciphers(s), &(p[2]), 0);
+ i = ssl_cipher_list_to_bytes(s, SSL_get_ciphers(s), &p[2]);
if (i == 0) {
SSLerr(SSL_F_DTLS1_CLIENT_HELLO,
SSL_R_NO_CIPHERS_AVAILABLE);