Remove weird ret negation logic.

This is a remnant of ssl3_get_client_hello's old DTLS cookie logic, which has
since been removed. (If we ever need HelloVerifyRequest support on the server,
we'll implement something stateless in front.) We can switch this to something
more straightforward now.

See also upstream's 94f98a9019e1c0a3be4ca904b2c27c7af3d937c0,

Change-Id: Ie733030209a381a4915d6744fa12a79ffe972fa5
Reviewed-on: https://boringssl-review.googlesource.com/6601
Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
David Benjamin 2015-12-01 14:14:40 -05:00 committed by Adam Langley
parent e9cddb8879
commit 0bd71eb85d

View File

@ -1099,9 +1099,7 @@ int ssl3_get_client_hello(SSL *s) {
* s->hit - session reuse flag
* s->tmp.new_cipher - the new cipher to use. */
if (ret < 0) {
ret = -ret;
}
ret = 1;
if (0) {
f_err: