summaryrefslogtreecommitdiffstats
path: root/ssl
diff options
context:
space:
mode:
authorRob Stradling <rob@comodo.com>2013-09-10 11:50:05 +0100
committerBen Laurie <ben@links.org>2013-09-16 14:03:21 +0100
commit9409e1817901c4f323ce558e0bee1171adac5cf4 (patch)
treeb1c7136bcea3c41c0e66d7fb4f6418efb8b6d28d /ssl
parent6a0b803fc067efc271e2ccd20d12e69618bed0a2 (diff)
Tidy up comments.
Diffstat (limited to 'ssl')
-rw-r--r--ssl/s3_lib.c4
-rw-r--r--ssl/ssl3.h4
-rw-r--r--ssl/t1_lib.c4
3 files changed, 6 insertions, 6 deletions
diff --git a/ssl/s3_lib.c b/ssl/s3_lib.c
index 26c0e96aed..2250faa2e2 100644
--- a/ssl/s3_lib.c
+++ b/ssl/s3_lib.c
@@ -3068,8 +3068,8 @@ void ssl3_clear(SSL *s)
s->s3->tlsext_custom_types_count = 0;
#ifndef OPENSSL_NO_EC
s->s3->is_probably_safari = 0;
-#endif /* OPENSSL_NO_EC */
-#endif /* OPENSSL_NO_TLSEXT */
+#endif /* !OPENSSL_NO_EC */
+#endif /* !OPENSSL_NO_TLSEXT */
rp = s->s3->rbuf.buf;
wp = s->s3->wbuf.buf;
diff --git a/ssl/ssl3.h b/ssl/ssl3.h
index 56416078ad..a142bbf30c 100644
--- a/ssl/ssl3.h
+++ b/ssl/ssl3.h
@@ -586,9 +586,9 @@ typedef struct ssl3_state_st
* running on OS X 10.6 or newer. We wish to know this because Safari
* on 10.8 .. 10.8.3 has broken ECDHE-ECDSA support. */
char is_probably_safari;
-#endif /* OPENSSL_NO_EC */
+#endif /* !OPENSSL_NO_EC */
-#endif /* OPENSSL_NO_TLSEXT */
+#endif /* !OPENSSL_NO_TLSEXT */
} SSL3_STATE;
#endif
diff --git a/ssl/t1_lib.c b/ssl/t1_lib.c
index a240587eec..f13ca49484 100644
--- a/ssl/t1_lib.c
+++ b/ssl/t1_lib.c
@@ -1843,7 +1843,7 @@ static void ssl_check_for_safari(SSL *s, const unsigned char *data, const unsign
s->s3->is_probably_safari = 1;
}
-#endif /* OPENSSL_NO_EC */
+#endif /* !OPENSSL_NO_EC */
static int ssl_scan_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n, int *al)
{
@@ -1868,7 +1868,7 @@ static int ssl_scan_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char
#ifndef OPENSSL_NO_EC
if (s->options & SSL_OP_SAFARI_ECDHE_ECDSA_BUG)
ssl_check_for_safari(s, data, d, n);
-#endif /* OPENSSL_NO_EC */
+#endif /* !OPENSSL_NO_EC */
/* Clear any signature algorithms extension received */
if (s->cert->peer_sigalgs)