aboutsummaryrefslogtreecommitdiffstats
path: root/contrib/restricted/aws/s2n/tls/s2n_cipher_suites.c
diff options
context:
space:
mode:
authorrobot-contrib <robot-contrib@yandex-team.com>2023-10-23 21:53:30 +0300
committerrobot-contrib <robot-contrib@yandex-team.com>2023-10-23 22:17:19 +0300
commit185aad3f5de6274260a161e58d92312d91813770 (patch)
tree39b2a93a9a649bffaaea9e405b00ceeea0d13c11 /contrib/restricted/aws/s2n/tls/s2n_cipher_suites.c
parenta14514f8c6ab647d334ae41253e65f69ee9b5fa6 (diff)
downloadydb-185aad3f5de6274260a161e58d92312d91813770.tar.gz
Update contrib/restricted/aws/s2n to 1.3.54
Diffstat (limited to 'contrib/restricted/aws/s2n/tls/s2n_cipher_suites.c')
-rw-r--r--contrib/restricted/aws/s2n/tls/s2n_cipher_suites.c11
1 files changed, 2 insertions, 9 deletions
diff --git a/contrib/restricted/aws/s2n/tls/s2n_cipher_suites.c b/contrib/restricted/aws/s2n/tls/s2n_cipher_suites.c
index d20325270b..2ea3632493 100644
--- a/contrib/restricted/aws/s2n/tls/s2n_cipher_suites.c
+++ b/contrib/restricted/aws/s2n/tls/s2n_cipher_suites.c
@@ -971,9 +971,6 @@ int s2n_crypto_disable_init(void)
/* Determines cipher suite availability and selects record algorithms */
int s2n_cipher_suites_init(void)
{
- /* RC4 requires some extra setup */
- POSIX_GUARD_RESULT(s2n_rc4_init());
-
const int num_cipher_suites = s2n_array_len(s2n_all_cipher_suites);
for (int i = 0; i < num_cipher_suites; i++) {
struct s2n_cipher_suite *cur_suite = s2n_all_cipher_suites[i];
@@ -1054,10 +1051,6 @@ S2N_RESULT s2n_cipher_suites_cleanup(void)
* cleanup in later versions */
#endif
}
-
- /* RC4 requires some extra cleanup */
- RESULT_GUARD(s2n_rc4_cleanup());
-
return S2N_RESULT_OK;
}
@@ -1179,7 +1172,7 @@ bool s2n_cipher_suite_uses_chacha20_alg(struct s2n_cipher_suite *cipher_suite)
return cipher_suite && cipher_suite->record_alg && cipher_suite->record_alg->cipher == &s2n_chacha20_poly1305;
}
-/* Iff the server has enabled allow_chacha20_boosting and the client has a chacha20 cipher suite as its most
+/* Iff the server has enabled allow_chacha20_boosting and the client has a chacha20 cipher suite as its most
* preferred cipher suite, then we have mutual chacha20 boosting support.
*/
static S2N_RESULT s2n_validate_chacha20_boosting(const struct s2n_cipher_preferences *cipher_preferences, const uint8_t *wire,
@@ -1254,7 +1247,7 @@ static int s2n_set_cipher_as_server(struct s2n_connection *conn, uint8_t *wire,
* other cipher suites.
*
* If no mutually supported cipher suites are found, we choose one with a version
- * too high for the current connection (higher_vers_match).
+ * too high for the current connection (higher_vers_match).
*/
for (size_t i = 0; i < cipher_preferences->count; i++) {
const uint8_t *ours = cipher_preferences->suites[i]->iana_value;