Remove OPENSSL_NO_TLS{,1}

A modern TLS library without full support for TLS does not make sense.

Change-Id: I032537d1412f6e4effc9a2dd47123baf0084b4c6
Reviewed-on: https://boringssl-review.googlesource.com/1382
Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
Alex Chernyakhovsky 2014-08-03 15:31:18 -04:00 committed by Adam Langley
parent dd11a10e30
commit a324603651
3 changed files with 0 additions and 6 deletions

View File

@ -1216,14 +1216,12 @@ start:
switch (rr->type)
{
default:
#ifndef OPENSSL_NO_TLS
/* TLS just ignores unknown message types */
if (s->version == TLS1_VERSION)
{
rr->length = 0;
goto start;
}
#endif
al=SSL_AD_UNEXPECTED_MESSAGE;
OPENSSL_PUT_ERROR(SSL, dtls1_read_bytes, SSL_R_UNEXPECTED_RECORD);
goto f_err;

View File

@ -70,7 +70,6 @@ static const SSL_METHOD *ssl23_get_method(int ver)
return(SSLv3_method());
else
#endif
#ifndef OPENSSL_NO_TLS1
if (ver == TLS1_VERSION)
return(TLSv1_method());
else if (ver == TLS1_1_VERSION)
@ -78,7 +77,6 @@ static const SSL_METHOD *ssl23_get_method(int ver)
else if (ver == TLS1_2_VERSION)
return(TLSv1_2_method());
else
#endif
return(NULL);
}

View File

@ -1367,7 +1367,6 @@ start:
switch (rr->type)
{
default:
#ifndef OPENSSL_NO_TLS
/* TLS up to v1.1 just ignores unknown message types:
* TLS v1.2 give an unexpected message alert.
*/
@ -1376,7 +1375,6 @@ start:
rr->length = 0;
goto start;
}
#endif
al=SSL_AD_UNEXPECTED_MESSAGE;
OPENSSL_PUT_ERROR(SSL, ssl3_read_bytes, SSL_R_UNEXPECTED_RECORD);
goto f_err;