diff --git a/configure.ac b/configure.ac index bf6c7e086..3c9bb9cb5 100644 --- a/configure.ac +++ b/configure.ac @@ -1330,7 +1330,7 @@ AC_ARG_ENABLE([renegotiation-indication], if test "x$ENABLED_RENEGOTIATION_INDICATION" = "xyes" then - AM_CFLAGS="$AM_CFLAGS -DHAVE_TLS_EXTENSIONS -DHAVE_RENEGOTIATION_INDICATION" + AM_CFLAGS="$AM_CFLAGS -DHAVE_RENEGOTIATION_INDICATION" fi # Supported Elliptic Curves Extensions diff --git a/src/internal.c b/src/internal.c index 2d2a3c3e9..98a7e354a 100644 --- a/src/internal.c +++ b/src/internal.c @@ -4351,21 +4351,15 @@ static int DoCertificate(CYASSL* ssl, byte* input, word32* inOutIdx, static int DoHelloRequest(CYASSL* ssl, const byte* input, word32* inOutIdx, word32 size, word32 totalSz) { - int ret = 0; + (void)input; if (size) /* must be 0 */ return BUFFER_ERROR; if (ssl->keys.encryptionOn) { - byte verify[MAX_DIGEST_SIZE]; int padSz = ssl->keys.encryptSz - HANDSHAKE_HEADER_SZ - ssl->specs.hash_size; - ret = ssl->hmac(ssl, verify, input + *inOutIdx - HANDSHAKE_HEADER_SZ, - HANDSHAKE_HEADER_SZ, handshake, 1); - if (ret != 0) - return ret; - if (ssl->options.tls1_1 && ssl->specs.cipher_type == block) padSz -= ssl->specs.block_size; @@ -4373,12 +4367,6 @@ static int DoHelloRequest(CYASSL* ssl, const byte* input, word32* inOutIdx, if ((word32) (*inOutIdx + ssl->specs.hash_size + padSz) > totalSz) return INCOMPLETE_DATA; - /* verify */ - if (XMEMCMP(input + *inOutIdx, verify, ssl->specs.hash_size) != 0) { - CYASSL_MSG(" hello_request verify mac error"); - return VERIFY_MAC_ERROR; - } - *inOutIdx += ssl->specs.hash_size + padSz; }