commit | 9417b7649f00a564ab903743f2d49e8740484883 | [log] [tgz] |
---|---|---|
author | David Benjamin <davidben@chromium.org> | Fri May 08 22:30:06 2015 -0400 |
committer | Adam Langley <agl@google.com> | Mon May 11 18:40:04 2015 +0000 |
tree | 9db5fc200b12a12fb381f613a71b240ec13b7ff0 | |
parent | ac4de241b187613df8f36bd3e56794fcdd247bf8 [diff] |
Remove DTLS special-cases in buffer releasing. They date to https://rt.openssl.org/Ticket/Display.html?id=2533, but no particularly good justification was given for them. It seems it was just a bandaid because d1_pkt.c forgot to initialize the buffer. I went through codesearch for all accesses to SSL3_BUFFER::buf and SSL::packet. They seem appropriately guarded but for this one. Change-Id: Ife4e7afdb7a7c137d6be4791542eb5de6dd5b1b6 Reviewed-on: https://boringssl-review.googlesource.com/4685 Reviewed-by: Adam Langley <agl@google.com>