Correct outdated comments

Change-Id: Idc3a41d025fefa9017fce108bed63cb8af426c9b
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/35244
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
This commit is contained in:
Watson Ladd 2019-03-07 13:06:00 -08:00 committed by CQ bot account: commit-bot@chromium.org
parent f9c8d30897
commit 3390fd88d7
2 changed files with 3 additions and 5 deletions

View File

@ -3069,7 +3069,7 @@ OPENSSL_EXPORT void SSL_get_peer_quic_transport_params(const SSL *ssl,
// host may use a delegated credential to sign the handshake. Once issued, // host may use a delegated credential to sign the handshake. Once issued,
// credentials can't be revoked. In order to mitigate the damage in case the // credentials can't be revoked. In order to mitigate the damage in case the
// credential secret key is compromised, the credential is only valid for a // credential secret key is compromised, the credential is only valid for a
// short time (days, hours, or even minutes). This library implements draft-02 // short time (days, hours, or even minutes). This library implements draft-03
// of the protocol spec. // of the protocol spec.
// //
// The extension ID has not been assigned; we're using 0xff02 for the time // The extension ID has not been assigned; we're using 0xff02 for the time
@ -3082,7 +3082,7 @@ OPENSSL_EXPORT void SSL_get_peer_quic_transport_params(const SSL *ssl,
// SSL_set1_delegated_credential configures the delegated credential (DC) that // SSL_set1_delegated_credential configures the delegated credential (DC) that
// will be sent to the peer for the current connection. |dc| is the DC in wire // will be sent to the peer for the current connection. |dc| is the DC in wire
// format, and |pkey| or |key_method| is the corresponding private key. // format, and |pkey| or |key_method| is the corresponding private key.
// Currently (as of draft-02), only servers may configure a DC to use in the // Currently (as of draft-03), only servers may configure a DC to use in the
// handshake. // handshake.
// //
// The DC will only be used if the protocol version is correct and the signature // The DC will only be used if the protocol version is correct and the signature

View File

@ -804,9 +804,7 @@ UniquePtr<DC> DC::Parse(CRYPTO_BUFFER *in, uint8_t *out_alert) {
// ssl_can_serve_dc returns true if the host has configured a DC that it can // ssl_can_serve_dc returns true if the host has configured a DC that it can
// serve in the handshake. Specifically, it checks that a DC has been // serve in the handshake. Specifically, it checks that a DC has been
// configured, that the DC protocol version is the same as the negotiated // configured and that the DC signature algorithm is supported by the peer.
// protocol version, and that the DC signature algorithm is supported by the
// peer.
static bool ssl_can_serve_dc(const SSL_HANDSHAKE *hs) { static bool ssl_can_serve_dc(const SSL_HANDSHAKE *hs) {
// Check that a DC has been configured. // Check that a DC has been configured.
const CERT *cert = hs->config->cert.get(); const CERT *cert = hs->config->cert.get();