Tidy up comments.
authorRob Stradling <rob@comodo.com>
Tue, 10 Sep 2013 11:25:57 +0000 (12:25 +0100)
committerBen Laurie <ben@links.org>
Fri, 13 Sep 2013 15:24:22 +0000 (16:24 +0100)
ssl/s3_lib.c
ssl/ssl3.h
ssl/t1_lib.c

index 331c4e6..618f53d 100644 (file)
@@ -3084,8 +3084,8 @@ void ssl3_clear(SSL *s)
        s->s3->tlsext_custom_types_count = 0;   
 #ifndef OPENSSL_NO_EC
        s->s3->is_probably_safari = 0;
-#endif /* OPENSSL_NO_EC */
-#endif /* OPENSSL_NO_TLSEXT */
+#endif /* !OPENSSL_NO_EC */
+#endif /* !OPENSSL_NO_TLSEXT */
 
        rp = s->s3->rbuf.buf;
        wp = s->s3->wbuf.buf;
index 5fd0279..f49e1c8 100644 (file)
@@ -590,9 +590,9 @@ typedef struct ssl3_state_st
         * running on OS X 10.6 or newer. We wish to know this because Safari
         * on 10.8 .. 10.8.3 has broken ECDHE-ECDSA support. */
        char is_probably_safari;
-#endif /* OPENSSL_NO_EC */
+#endif /* !OPENSSL_NO_EC */
 
-#endif /* OPENSSL_NO_TLSEXT */
+#endif /* !OPENSSL_NO_TLSEXT */
        } SSL3_STATE;
 
 #endif
index c46e711..e07e8c6 100644 (file)
@@ -1893,7 +1893,7 @@ static void ssl_check_for_safari(SSL *s, const unsigned char *data, const unsign
 
        s->s3->is_probably_safari = 1;
 }
-#endif /* OPENSSL_NO_EC */
+#endif /* !OPENSSL_NO_EC */
 
 static int ssl_scan_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n, int *al) 
        {       
@@ -1932,7 +1932,7 @@ static int ssl_scan_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char
 #ifndef OPENSSL_NO_EC
        if (s->options & SSL_OP_SAFARI_ECDHE_ECDSA_BUG)
                ssl_check_for_safari(s, data, d, n);
-#endif /* OPENSSL_NO_EC */
+#endif /* !OPENSSL_NO_EC */
 
        /* Clear any signature algorithms extension received */
        if (s->cert->peer_sigalgs)