summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl3.h
diff options
context:
space:
mode:
authormiod <>2014-06-13 04:29:13 +0000
committermiod <>2014-06-13 04:29:13 +0000
commit9ef9f06708ef4fe615f3485f5d82f3fb919fdf03 (patch)
tree4a096128d8787d1beedaa53fd558a98773de0840 /src/lib/libssl/ssl3.h
parentcc594d5ff9b7bb08404d34d62287ee1dfd6b8332 (diff)
downloadopenbsd-9ef9f06708ef4fe615f3485f5d82f3fb919fdf03.tar.gz
openbsd-9ef9f06708ef4fe615f3485f5d82f3fb919fdf03.tar.bz2
openbsd-9ef9f06708ef4fe615f3485f5d82f3fb919fdf03.zip
Remove support for the `opaque PRF input' extension, which draft has expired
7 years ago and never made it into an RFC. That code wasn't compiled in anyway unless one would define the actual on-the-wire extension id bytes; crank libssl major. With help and enlightenment from Brendan MacDonell.
Diffstat (limited to '')
-rw-r--r--src/lib/libssl/ssl3.h11
1 files changed, 1 insertions, 10 deletions
diff --git a/src/lib/libssl/ssl3.h b/src/lib/libssl/ssl3.h
index 7378136646..7fd00be2d3 100644
--- a/src/lib/libssl/ssl3.h
+++ b/src/lib/libssl/ssl3.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl3.h,v 1.21 2014/06/12 15:49:31 deraadt Exp $ */ 1/* $OpenBSD: ssl3.h,v 1.22 2014/06/13 04:29:13 miod Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -452,15 +452,6 @@ typedef struct ssl3_state_st {
452 452
453 int in_read_app_data; 453 int in_read_app_data;
454 454
455 /* Opaque PRF input as used for the current handshake.
456 * These fields are used only if TLSEXT_TYPE_opaque_prf_input is defined
457 * (otherwise, they are merely present to improve binary compatibility)
458 */
459 void *client_opaque_prf_input;
460 size_t client_opaque_prf_input_len;
461 void *server_opaque_prf_input;
462 size_t server_opaque_prf_input_len;
463
464 struct { 455 struct {
465 /* actually only needs to be 16+20 */ 456 /* actually only needs to be 16+20 */
466 unsigned char cert_verify_md[EVP_MAX_MD_SIZE*2]; 457 unsigned char cert_verify_md[EVP_MAX_MD_SIZE*2];