Remove some dead code from rec_layer_s3.c
authorMatt Caswell <matt@openssl.org>
Wed, 24 Aug 2016 10:28:58 +0000 (11:28 +0100)
committerMatt Caswell <matt@openssl.org>
Wed, 24 Aug 2016 10:28:58 +0000 (11:28 +0100)
It is never valid to call ssl3_read_bytes with
type == SSL3_RT_CHANGE_CIPHER_SPEC, and in fact we check for valid values
for type near the beginning of the function. Therefore this check will never
be true and can be removed.

Reviewed-by: Tim Hudson <tjh@openssl.org>
ssl/record/rec_layer_s3.c

index 52a8dcf4e50146cbf361732619364b92d75efd46..46870c054b82b9ba1ac2365bed6d1cb1d36e72cf 100644 (file)
@@ -1159,12 +1159,6 @@ int ssl3_read_bytes(SSL *s, int type, int *recvd_type, unsigned char *buf,
      * were actually expecting a CCS).
      */
 
-    if (rr->type == SSL3_RT_HANDSHAKE && type == SSL3_RT_CHANGE_CIPHER_SPEC) {
-        al = SSL_AD_UNEXPECTED_MESSAGE;
-        SSLerr(SSL_F_SSL3_READ_BYTES, SSL_R_UNEXPECTED_MESSAGE);
-        goto f_err;
-    }
-
     /*
      * Lets just double check that we've not got an SSLv2 record
      */