diff options
author | Emilia Kasper <emilia@openssl.org> | 2015-06-09 14:17:50 +0200 |
---|---|---|
committer | Emilia Kasper <emilia@openssl.org> | 2015-06-10 13:55:11 +0200 |
commit | a8e4ac6a2fe67c19672ecf0c6aeafa15801ce3a5 (patch) | |
tree | 934aed3d0461152ac51aa12d6829e1934a31c743 /apps/s_server.c | |
parent | 91d13f1a76216f7d67f7a3068bab2287831ca615 (diff) |
Remove SSL_OP_TLS_BLOCK_PADDING_BUG
This is a workaround so old that nobody remembers what buggy clients
it was for. It's also been broken in stable branches for two years and
nobody noticed (see
https://boringssl-review.googlesource.com/#/c/1694/).
Reviewed-by: Tim Hudson <tjh@openssl.org>
Diffstat (limited to 'apps/s_server.c')
-rw-r--r-- | apps/s_server.c | 3 |
1 files changed, 0 insertions, 3 deletions
diff --git a/apps/s_server.c b/apps/s_server.c index 8354386ba4..072d30d8e3 100644 --- a/apps/s_server.c +++ b/apps/s_server.c @@ -2462,9 +2462,6 @@ static int init_ssl_connection(SSL *con) #endif if (SSL_cache_hit(con)) BIO_printf(bio_s_out, "Reused session-id\n"); - if (SSL_ctrl(con, SSL_CTRL_GET_FLAGS, 0, NULL) & - TLS1_FLAGS_TLS_PADDING_BUG) - BIO_printf(bio_s_out, "Peer has incorrect TLSv1 block padding\n"); BIO_printf(bio_s_out, "Secure Renegotiation IS%s supported\n", SSL_get_secure_renegotiation_support(con) ? "" : " NOT"); if (keymatexportlabel != NULL) { |