Remove unnecessary direct access to SSL_CIPHER struct.

The cipher is always valid here, so this check was never needed anyway.

Change-Id: I22be273d166702926b98f0c9443657a1dde65f6e
Reviewed-by: Daniel Molkentin <daniel@molkentin.de>
This commit is contained in:
Richard J. Moore 2015-02-08 11:38:18 +00:00 committed by Daniel Molkentin
parent 9f59341d07
commit 31e85dc2a1

View File

@ -646,7 +646,6 @@ void QSslSocketPrivate::resetDefaultCiphers()
STACK_OF(SSL_CIPHER) *supportedCiphers = q_SSL_get_ciphers(mySsl);
for (int i = 0; i < q_sk_SSL_CIPHER_num(supportedCiphers); ++i) {
if (SSL_CIPHER *cipher = q_sk_SSL_CIPHER_value(supportedCiphers, i)) {
if (cipher->valid) {
QSslCipher ciph = QSslSocketBackendPrivate::QSslCipher_from_SSL_CIPHER(cipher);
if (!ciph.isNull()) {
// Unconditionally exclude ADH ciphers since they offer no MITM protection
@ -657,7 +656,6 @@ void QSslSocketPrivate::resetDefaultCiphers()
}
}
}
}
q_SSL_CTX_free(myCtx);
q_SSL_free(mySsl);