summaryrefslogtreecommitdiffstats
path: root/lib/libssl/ssl_ciph.c
diff options
context:
space:
mode:
authorjsing <jsing@openbsd.org>2014-05-25 13:32:51 +0000
committerjsing <jsing@openbsd.org>2014-05-25 13:32:51 +0000
commit2f197742ceab3e08fea082958c525e6e8a0cfdfa (patch)
tree2f8c2ddeb19ebc9a944cc99c9a49ea96bacf1f4e /lib/libssl/ssl_ciph.c
parentThe ssl_ciper_get_evp() function is currently overloaded to also return the (diff)
downloadwireguard-openbsd-2f197742ceab3e08fea082958c525e6e8a0cfdfa.tar.xz
wireguard-openbsd-2f197742ceab3e08fea082958c525e6e8a0cfdfa.zip
Turn off MemCheck_on and MemCheck_off. These calls are pointless since the
crypto memory debugging code has been castrated. ok miod@ "kill it" beck@
Diffstat (limited to 'lib/libssl/ssl_ciph.c')
-rw-r--r--lib/libssl/ssl_ciph.c2
1 files changed, 0 insertions, 2 deletions
diff --git a/lib/libssl/ssl_ciph.c b/lib/libssl/ssl_ciph.c
index bd939b7563c..22ed70b30b1 100644
--- a/lib/libssl/ssl_ciph.c
+++ b/lib/libssl/ssl_ciph.c
@@ -453,7 +453,6 @@ load_builtin_compressions(void)
if (ssl_comp_methods == NULL) {
SSL_COMP *comp = NULL;
- MemCheck_off();
ssl_comp_methods = sk_SSL_COMP_new(sk_comp_cmp);
if (ssl_comp_methods != NULL) {
comp = malloc(sizeof(SSL_COMP));
@@ -470,7 +469,6 @@ load_builtin_compressions(void)
}
sk_SSL_COMP_sort(ssl_comp_methods);
}
- MemCheck_on();
}
}