summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl.h
diff options
context:
space:
mode:
authorjsing <>2014-05-31 10:49:28 +0000
committerjsing <>2014-05-31 10:49:28 +0000
commitcc0b160e462358c219bef48df27be2e816b65194 (patch)
tree32a374445fa15f520b06510f07c011a6234df599 /src/lib/libssl/ssl.h
parent57e924c96320c9b14de6078fc75984c949b073b2 (diff)
downloadopenbsd-cc0b160e462358c219bef48df27be2e816b65194.tar.gz
openbsd-cc0b160e462358c219bef48df27be2e816b65194.tar.bz2
openbsd-cc0b160e462358c219bef48df27be2e816b65194.zip
TLS would not be entirely functional without extensions, so unifdef
OPENSSL_NO_TLSEXT. ok tedu@
Diffstat (limited to 'src/lib/libssl/ssl.h')
-rw-r--r--src/lib/libssl/ssl.h12
1 files changed, 0 insertions, 12 deletions
diff --git a/src/lib/libssl/ssl.h b/src/lib/libssl/ssl.h
index 45968ce16a..d6f875a797 100644
--- a/src/lib/libssl/ssl.h
+++ b/src/lib/libssl/ssl.h
@@ -504,7 +504,6 @@ struct ssl_session_st {
504 /* These are used to make removal of session-ids more 504 /* These are used to make removal of session-ids more
505 * efficient and to implement a maximum cache size. */ 505 * efficient and to implement a maximum cache size. */
506 struct ssl_session_st *prev, *next; 506 struct ssl_session_st *prev, *next;
507#ifndef OPENSSL_NO_TLSEXT
508 char *tlsext_hostname; 507 char *tlsext_hostname;
509#ifndef OPENSSL_NO_EC 508#ifndef OPENSSL_NO_EC
510 size_t tlsext_ecpointformatlist_length; 509 size_t tlsext_ecpointformatlist_length;
@@ -516,7 +515,6 @@ struct ssl_session_st {
516 unsigned char *tlsext_tick; /* Session ticket */ 515 unsigned char *tlsext_tick; /* Session ticket */
517 size_t tlsext_ticklen; /* Session ticket length */ 516 size_t tlsext_ticklen; /* Session ticket length */
518 long tlsext_tick_lifetime_hint; /* Session lifetime hint in seconds */ 517 long tlsext_tick_lifetime_hint; /* Session lifetime hint in seconds */
519#endif
520}; 518};
521 519
522#endif 520#endif
@@ -841,7 +839,6 @@ struct ssl_ctx_st {
841 ENGINE *client_cert_engine; 839 ENGINE *client_cert_engine;
842#endif 840#endif
843 841
844#ifndef OPENSSL_NO_TLSEXT
845 /* TLS extensions servername callback */ 842 /* TLS extensions servername callback */
846 int (*tlsext_servername_callback)(SSL*, int *, void *); 843 int (*tlsext_servername_callback)(SSL*, int *, void *);
847 void *tlsext_servername_arg; 844 void *tlsext_servername_arg;
@@ -862,7 +859,6 @@ struct ssl_ctx_st {
862 int (*tlsext_opaque_prf_input_callback)(SSL *, void *peerinput, 859 int (*tlsext_opaque_prf_input_callback)(SSL *, void *peerinput,
863 size_t len, void *arg); 860 size_t len, void *arg);
864 void *tlsext_opaque_prf_input_callback_arg; 861 void *tlsext_opaque_prf_input_callback_arg;
865#endif
866 862
867#ifndef OPENSSL_NO_PSK 863#ifndef OPENSSL_NO_PSK
868 char *psk_identity_hint; 864 char *psk_identity_hint;
@@ -874,7 +870,6 @@ struct ssl_ctx_st {
874#endif 870#endif
875 871
876 872
877#ifndef OPENSSL_NO_TLSEXT
878 873
879# ifndef OPENSSL_NO_NEXTPROTONEG 874# ifndef OPENSSL_NO_NEXTPROTONEG
880 /* Next protocol negotiation information */ 875 /* Next protocol negotiation information */
@@ -895,7 +890,6 @@ struct ssl_ctx_st {
895 /* SRTP profiles we are willing to do from RFC 5764 */ 890 /* SRTP profiles we are willing to do from RFC 5764 */
896 STACK_OF(SRTP_PROTECTION_PROFILE) *srtp_profiles; 891 STACK_OF(SRTP_PROTECTION_PROFILE) *srtp_profiles;
897 892
898#endif
899}; 893};
900 894
901#endif 895#endif
@@ -1186,7 +1180,6 @@ struct ssl_st {
1186 int client_version; /* what was passed, used for 1180 int client_version; /* what was passed, used for
1187 * SSLv3/TLS rollback check */ 1181 * SSLv3/TLS rollback check */
1188 unsigned int max_send_fragment; 1182 unsigned int max_send_fragment;
1189#ifndef OPENSSL_NO_TLSEXT
1190 /* TLS extension debug callback */ 1183 /* TLS extension debug callback */
1191 void (*tlsext_debug_cb)(SSL *s, int client_server, int type, 1184 void (*tlsext_debug_cb)(SSL *s, int client_server, int type,
1192 unsigned char *data, int len, void *arg); 1185 unsigned char *data, int len, void *arg);
@@ -1259,9 +1252,6 @@ struct ssl_st {
1259 */ 1252 */
1260 unsigned int tlsext_hb_pending; /* Indicates if a HeartbeatRequest is in flight */ 1253 unsigned int tlsext_hb_pending; /* Indicates if a HeartbeatRequest is in flight */
1261 unsigned int tlsext_hb_seq; /* HeartbeatRequest sequence number */ 1254 unsigned int tlsext_hb_seq; /* HeartbeatRequest sequence number */
1262#else
1263#define session_ctx ctx
1264#endif /* OPENSSL_NO_TLSEXT */
1265 1255
1266 int renegotiate;/* 1 if we are renegotiating. 1256 int renegotiate;/* 1 if we are renegotiating.
1267 * 2 if we are a server and are inside a handshake 1257 * 2 if we are a server and are inside a handshake
@@ -1467,7 +1457,6 @@ DECLARE_PEM_rw(SSL_SESSION, SSL_SESSION)
1467#define SSL_CTRL_SET_MAX_SEND_FRAGMENT 52 1457#define SSL_CTRL_SET_MAX_SEND_FRAGMENT 52
1468 1458
1469/* see tls1.h for macros based on these */ 1459/* see tls1.h for macros based on these */
1470#ifndef OPENSSL_NO_TLSEXT
1471#define SSL_CTRL_SET_TLSEXT_SERVERNAME_CB 53 1460#define SSL_CTRL_SET_TLSEXT_SERVERNAME_CB 53
1472#define SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG 54 1461#define SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG 54
1473#define SSL_CTRL_SET_TLSEXT_HOSTNAME 55 1462#define SSL_CTRL_SET_TLSEXT_HOSTNAME 55
@@ -1498,7 +1487,6 @@ DECLARE_PEM_rw(SSL_SESSION, SSL_SESSION)
1498#define SSL_CTRL_SET_TLS_EXT_SRP_USERNAME 79 1487#define SSL_CTRL_SET_TLS_EXT_SRP_USERNAME 79
1499#define SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH 80 1488#define SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH 80
1500#define SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD 81 1489#define SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD 81
1501#endif
1502 1490
1503#define DTLS_CTRL_GET_TIMEOUT 73 1491#define DTLS_CTRL_GET_TIMEOUT 73
1504#define DTLS_CTRL_HANDLE_TIMEOUT 74 1492#define DTLS_CTRL_HANDLE_TIMEOUT 74