Remove redundant s->server assignments in handshake. It should be set correctly prior to entering the handshake. Don't mask bugs by assigning it. Change-Id: Ib9bca8fad68916b3b242aad8819e3760e59e777a Reviewed-on: https://boringssl-review.googlesource.com/2443 Reviewed-by: Adam Langley <agl@google.com>
diff --git a/ssl/d1_clnt.c b/ssl/d1_clnt.c index 88a6af4..f291549 100644 --- a/ssl/d1_clnt.c +++ b/ssl/d1_clnt.c
@@ -136,6 +136,8 @@ int new_state,state,skip=0; assert(s->handshake_func == dtls1_connect); + assert(!s->server); + ERR_clear_error(); ERR_clear_system_error(); @@ -160,7 +162,6 @@ case SSL_ST_CONNECT: case SSL_ST_BEFORE|SSL_ST_CONNECT: - s->server=0; if (cb != NULL) cb(s,SSL_CB_HANDSHAKE_START,1); if ((s->version & 0xff00 ) != (DTLS1_VERSION & 0xff00))
diff --git a/ssl/d1_srvr.c b/ssl/d1_srvr.c index 5da2fa8..38da356 100644 --- a/ssl/d1_srvr.c +++ b/ssl/d1_srvr.c
@@ -137,6 +137,8 @@ int new_state,state,skip=0; assert(s->handshake_func == dtls1_accept); + assert(s->server); + ERR_clear_error(); ERR_clear_system_error(); @@ -166,7 +168,6 @@ case SSL_ST_ACCEPT: case SSL_ST_BEFORE|SSL_ST_ACCEPT: - s->server=1; if (cb != NULL) cb(s,SSL_CB_HANDSHAKE_START,1); if ((s->version & 0xff00) != (DTLS1_VERSION & 0xff00))
diff --git a/ssl/s23_clnt.c b/ssl/s23_clnt.c index 71b3936..f39730b 100644 --- a/ssl/s23_clnt.c +++ b/ssl/s23_clnt.c
@@ -106,6 +106,7 @@ * (eay@cryptsoft.com). This product includes software written by Tim * Hudson (tjh@cryptsoft.com). */ +#include <assert.h> #include <stdio.h> #include <openssl/buf.h> @@ -130,6 +131,9 @@ int ret= -1; int new_state,state; + assert(s->handshake_func == ssl23_connect); + assert(!s->server); + ERR_clear_error(); ERR_clear_system_error(); @@ -149,7 +153,6 @@ case SSL_ST_CONNECT: case SSL_ST_BEFORE|SSL_ST_CONNECT: - s->server=0; if (cb != NULL) cb(s,SSL_CB_HANDSHAKE_START,1); if (s->init_buf == NULL)
diff --git a/ssl/s23_srvr.c b/ssl/s23_srvr.c index 57adbd7..aa29c4e 100644 --- a/ssl/s23_srvr.c +++ b/ssl/s23_srvr.c
@@ -146,6 +146,9 @@ int ret= -1; int new_state,state; + assert(s->handshake_func == ssl23_accept); + assert(s->server); + ERR_clear_error(); ERR_clear_system_error(); @@ -165,7 +168,6 @@ case SSL_ST_ACCEPT: case SSL_ST_BEFORE|SSL_ST_ACCEPT: - s->server=1; if (cb != NULL) cb(s,SSL_CB_HANDSHAKE_START,1); if (s->init_buf == NULL)
diff --git a/ssl/s3_clnt.c b/ssl/s3_clnt.c index 635606e..e16e256 100644 --- a/ssl/s3_clnt.c +++ b/ssl/s3_clnt.c
@@ -174,6 +174,8 @@ int new_state,state,skip=0; assert(s->handshake_func == ssl3_connect); + assert(!s->server); + ERR_clear_error(); ERR_clear_system_error(); @@ -198,7 +200,6 @@ case SSL_ST_CONNECT: case SSL_ST_BEFORE|SSL_ST_CONNECT: - s->server=0; if (cb != NULL) cb(s,SSL_CB_HANDSHAKE_START,1); if ((s->version & 0xff00 ) != 0x0300)
diff --git a/ssl/s3_srvr.c b/ssl/s3_srvr.c index 527850b..d915fc8 100644 --- a/ssl/s3_srvr.c +++ b/ssl/s3_srvr.c
@@ -181,6 +181,8 @@ int new_state,state,skip=0; assert(s->handshake_func == ssl3_accept); + assert(s->server); + ERR_clear_error(); ERR_clear_system_error(); @@ -210,7 +212,6 @@ case SSL_ST_ACCEPT: case SSL_ST_BEFORE|SSL_ST_ACCEPT: - s->server=1; if (cb != NULL) cb(s,SSL_CB_HANDSHAKE_START,1); if ((s->version>>8) != 3)