Remove weird ret negation logic.
This is a remnant of ssl3_get_client_hello's old DTLS cookie logic, which has since been removed. (If we ever need HelloVerifyRequest support on the server, we'll implement something stateless in front.) We can switch this to something more straightforward now. See also upstream's 94f98a9019e1c0a3be4ca904b2c27c7af3d937c0, Change-Id: Ie733030209a381a4915d6744fa12a79ffe972fa5 Reviewed-on: https://boringssl-review.googlesource.com/6601 Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
parent
e9cddb8879
commit
0bd71eb85d
@ -1099,9 +1099,7 @@ int ssl3_get_client_hello(SSL *s) {
|
||||
* s->hit - session reuse flag
|
||||
* s->tmp.new_cipher - the new cipher to use. */
|
||||
|
||||
if (ret < 0) {
|
||||
ret = -ret;
|
||||
}
|
||||
ret = 1;
|
||||
|
||||
if (0) {
|
||||
f_err:
|
||||
|
Loading…
Reference in New Issue
Block a user