Tidy up comments.
diff --git a/ssl/s3_lib.c b/ssl/s3_lib.c
index 331c4e6..618f53d 100644
--- a/ssl/s3_lib.c
+++ b/ssl/s3_lib.c
@@ -3084,8 +3084,8 @@
 	s->s3->tlsext_custom_types_count = 0;	
 #ifndef OPENSSL_NO_EC
 	s->s3->is_probably_safari = 0;
-#endif /* OPENSSL_NO_EC */
-#endif /* OPENSSL_NO_TLSEXT */
+#endif /* !OPENSSL_NO_EC */
+#endif /* !OPENSSL_NO_TLSEXT */
 
 	rp = s->s3->rbuf.buf;
 	wp = s->s3->wbuf.buf;
diff --git a/ssl/ssl3.h b/ssl/ssl3.h
index 5fd0279..f49e1c8 100644
--- a/ssl/ssl3.h
+++ b/ssl/ssl3.h
@@ -590,9 +590,9 @@
 	 * running on OS X 10.6 or newer. We wish to know this because Safari
 	 * on 10.8 .. 10.8.3 has broken ECDHE-ECDSA support. */
 	char is_probably_safari;
-#endif	/* OPENSSL_NO_EC */
+#endif /* !OPENSSL_NO_EC */
 
-#endif	/* OPENSSL_NO_TLSEXT */
+#endif /* !OPENSSL_NO_TLSEXT */
 	} SSL3_STATE;
 
 #endif
diff --git a/ssl/t1_lib.c b/ssl/t1_lib.c
index c46e711..e07e8c6 100644
--- a/ssl/t1_lib.c
+++ b/ssl/t1_lib.c
@@ -1893,7 +1893,7 @@
 
 	s->s3->is_probably_safari = 1;
 }
-#endif	/* OPENSSL_NO_EC */
+#endif /* !OPENSSL_NO_EC */
 
 static int ssl_scan_clienthello_tlsext(SSL *s, unsigned char **p, unsigned char *d, int n, int *al) 
 	{	
@@ -1932,7 +1932,7 @@
 #ifndef OPENSSL_NO_EC
 	if (s->options & SSL_OP_SAFARI_ECDHE_ECDSA_BUG)
 		ssl_check_for_safari(s, data, d, n);
-#endif	/* OPENSSL_NO_EC */
+#endif /* !OPENSSL_NO_EC */
 
 	/* Clear any signature algorithms extension received */
 	if (s->cert->peer_sigalgs)