disable handshake_cutthrough.patch
CTS tests exposed compatability problems for SSLSocket applications
with handshake cutthrough enabled. Disabling until they can be
resolved. b/2586347
Change-Id: If2e43f50712780e1905c86b64ac2f89e95e7cc95
diff --git a/ssl/s3_lib.c b/ssl/s3_lib.c
index 592d6b9..8fa4ab0 100644
--- a/ssl/s3_lib.c
+++ b/ssl/s3_lib.c
@@ -2566,22 +2566,9 @@
static int ssl3_read_internal(SSL *s, void *buf, int len, int peek)
{
- int n,ret;
+ int ret;
clear_sys_error();
- if ((s->s3->flags & SSL3_FLAGS_POP_BUFFER) && (s->wbio == s->bbio))
- {
- /* Deal with an application that calls SSL_read() when handshake data
- * is yet to be written.
- */
- if (BIO_wpending(s->wbio) > 0)
- {
- s->rwstate=SSL_WRITING;
- n=BIO_flush(s->wbio);
- if (n <= 0) return(n);
- s->rwstate=SSL_NOTHING;
- }
- }
if (s->s3->renegotiate) ssl3_renegotiate_check(s);
s->s3->in_read_app_data=1;
ret=s->method->ssl_read_bytes(s,SSL3_RT_APPLICATION_DATA,buf,len,peek);