summaryrefslogtreecommitdiffstats
path: root/apps/s_server.c
diff options
context:
space:
mode:
authorEmilia Kasper <emilia@openssl.org>2015-06-09 14:17:50 +0200
committerEmilia Kasper <emilia@openssl.org>2015-06-10 13:55:11 +0200
commita8e4ac6a2fe67c19672ecf0c6aeafa15801ce3a5 (patch)
tree934aed3d0461152ac51aa12d6829e1934a31c743 /apps/s_server.c
parent91d13f1a76216f7d67f7a3068bab2287831ca615 (diff)
Remove SSL_OP_TLS_BLOCK_PADDING_BUG
This is a workaround so old that nobody remembers what buggy clients it was for. It's also been broken in stable branches for two years and nobody noticed (see https://boringssl-review.googlesource.com/#/c/1694/). Reviewed-by: Tim Hudson <tjh@openssl.org>
Diffstat (limited to 'apps/s_server.c')
-rw-r--r--apps/s_server.c3
1 files changed, 0 insertions, 3 deletions
diff --git a/apps/s_server.c b/apps/s_server.c
index 8354386ba4..072d30d8e3 100644
--- a/apps/s_server.c
+++ b/apps/s_server.c
@@ -2462,9 +2462,6 @@ static int init_ssl_connection(SSL *con)
#endif
if (SSL_cache_hit(con))
BIO_printf(bio_s_out, "Reused session-id\n");
- if (SSL_ctrl(con, SSL_CTRL_GET_FLAGS, 0, NULL) &
- TLS1_FLAGS_TLS_PADDING_BUG)
- BIO_printf(bio_s_out, "Peer has incorrect TLSv1 block padding\n");
BIO_printf(bio_s_out, "Secure Renegotiation IS%s supported\n",
SSL_get_secure_renegotiation_support(con) ? "" : " NOT");
if (keymatexportlabel != NULL) {