Browse Source

Remove dead code.

We already check for ciphers == NULL earlier in the function.

Change-Id: I0e676816d891e1d24cf45cab449c4d3915ec54ee
Reviewed-on: https://boringssl-review.googlesource.com/8815
Reviewed-by: Steven Valdez <svaldez@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
kris/onging/CECPQ3_patch15
David Benjamin 8 years ago
committed by CQ bot account: commit-bot@chromium.org
parent
commit
eeef635a3f
1 changed files with 0 additions and 6 deletions
  1. +0
    -6
      ssl/handshake_server.c

+ 0
- 6
ssl/handshake_server.c View File

@@ -772,12 +772,6 @@ static int ssl3_get_client_hello(SSL *ssl) {

/* Given ciphers and SSL_get_ciphers, we must pick a cipher */
if (!ssl->hit) {
if (ciphers == NULL) {
al = SSL_AD_ILLEGAL_PARAMETER;
OPENSSL_PUT_ERROR(SSL, SSL_R_NO_CIPHERS_PASSED);
goto f_err;
}

/* Let cert callback update server certificates if required */
if (ssl->cert->cert_cb) {
int rv = ssl->cert->cert_cb(ssl, ssl->cert->cert_cb_arg);


Loading…
Cancel
Save