Tidy up comments.
authorRob Stradling <rob@comodo.com>
Tue, 10 Sep 2013 11:45:34 +0000 (12:45 +0100)
committerBen Laurie <ben@links.org>
Fri, 4 Oct 2013 13:55:01 +0000 (14:55 +0100)
ssl/s3_lib.c
ssl/ssl3.h
ssl/t1_lib.c

index bdfb26db20bea0b2827ca7f1c2532ac4d897e316..531063679d787623fab9c015008eda777d750f6e 100644 (file)
@@ -1737,8 +1737,8 @@ void ssl3_clear(SSL *s)
 #ifndef OPENSSL_NO_TLSEXT
 #ifndef OPENSSL_NO_EC
        s->s3->is_probably_safari = 0;
-#endif /* OPENSSL_NO_EC */
-#endif /* OPENSSL_NO_TLSEXT */
+#endif /* !OPENSSL_NO_EC */
+#endif /* !OPENSSL_NO_TLSEXT */
 
        rp = s->s3->rbuf.buf;
        wp = s->s3->wbuf.buf;
index 4cc063821a5ccd9afa077e3e7fcd38a3b7a97d50..2a83a2ad2150dba8c2c45d55d7d8550c47485fca 100644 (file)
@@ -467,8 +467,8 @@ typedef struct ssl3_state_st
         * running on OS X 10.6 or newer. We wish to know this because Safari
         * on 10.8 .. 10.8.3 has broken ECDHE-ECDSA support. */
        char is_probably_safari;
-#endif /* OPENSSL_NO_EC */
-#endif /* OPENSSL_NO_TLSEXT */
+#endif /* !OPENSSL_NO_EC */
+#endif /* !OPENSSL_NO_TLSEXT */
 
        } SSL3_STATE;
 
index 98e86bff988fada364c0bfe7ae296f647cd98ffd..09b06a5af7306cbde3cb2fbb954f69fba9e010c8 100644 (file)
@@ -425,7 +425,7 @@ static void ssl_check_for_safari(SSL *s, const unsigned char *data, const unsign
 
        s->s3->is_probably_safari = 1;
 }
-#endif /* OPENSSL_NO_EC */
+#endif /* !OPENSSL_NO_EC */
 
 int ssl_parse_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n, int *al)
        {
@@ -441,7 +441,7 @@ int ssl_parse_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *d, in
 #ifndef OPENSSL_NO_EC
        if (s->options & SSL_OP_SAFARI_ECDHE_ECDSA_BUG)
                ssl_check_for_safari(s, data, d, n);
-#endif /* OPENSSL_NO_EC */
+#endif /* !OPENSSL_NO_EC */
 
        if (data >= (d+n-2))
                goto ri_check;