diff options
author | miod <> | 2014-06-13 04:29:13 +0000 |
---|---|---|
committer | miod <> | 2014-06-13 04:29:13 +0000 |
commit | d5ef9e45efacfb03f6c910ba83856fb0d05de6bc (patch) | |
tree | 4a096128d8787d1beedaa53fd558a98773de0840 /src/lib/libssl/ssl_err.c | |
parent | 62fc04d99bb7daa7bc91641190502c1d2b3251cc (diff) | |
download | openbsd-d5ef9e45efacfb03f6c910ba83856fb0d05de6bc.tar.gz openbsd-d5ef9e45efacfb03f6c910ba83856fb0d05de6bc.tar.bz2 openbsd-d5ef9e45efacfb03f6c910ba83856fb0d05de6bc.zip |
Remove support for the `opaque PRF input' extension, which draft has expired
7 years ago and never made it into an RFC. That code wasn't compiled in
anyway unless one would define the actual on-the-wire extension id bytes;
crank libssl major.
With help and enlightenment from Brendan MacDonell.
Diffstat (limited to 'src/lib/libssl/ssl_err.c')
-rw-r--r-- | src/lib/libssl/ssl_err.c | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/src/lib/libssl/ssl_err.c b/src/lib/libssl/ssl_err.c index 2bb6dcb4a8..0f18b1bc5f 100644 --- a/src/lib/libssl/ssl_err.c +++ b/src/lib/libssl/ssl_err.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_err.c,v 1.23 2014/06/12 15:49:31 deraadt Exp $ */ | 1 | /* $OpenBSD: ssl_err.c,v 1.24 2014/06/13 04:29:13 miod Exp $ */ |
2 | /* ==================================================================== | 2 | /* ==================================================================== |
3 | * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. | 3 | * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved. |
4 | * | 4 | * |
@@ -454,7 +454,6 @@ static ERR_STRING_DATA SSL_str_reasons[]= { | |||
454 | {ERR_REASON(SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED), "old session cipher not returned"}, | 454 | {ERR_REASON(SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED), "old session cipher not returned"}, |
455 | {ERR_REASON(SSL_R_OLD_SESSION_COMPRESSION_ALGORITHM_NOT_RETURNED), "old session compression algorithm not returned"}, | 455 | {ERR_REASON(SSL_R_OLD_SESSION_COMPRESSION_ALGORITHM_NOT_RETURNED), "old session compression algorithm not returned"}, |
456 | {ERR_REASON(SSL_R_ONLY_TLS_ALLOWED_IN_FIPS_MODE), "only tls allowed in fips mode"}, | 456 | {ERR_REASON(SSL_R_ONLY_TLS_ALLOWED_IN_FIPS_MODE), "only tls allowed in fips mode"}, |
457 | {ERR_REASON(SSL_R_OPAQUE_PRF_INPUT_TOO_LONG), "opaque PRF input too long"}, | ||
458 | {ERR_REASON(SSL_R_PACKET_LENGTH_TOO_LONG), "packet length too long"}, | 457 | {ERR_REASON(SSL_R_PACKET_LENGTH_TOO_LONG), "packet length too long"}, |
459 | {ERR_REASON(SSL_R_PARSE_TLSEXT) , "parse tlsext"}, | 458 | {ERR_REASON(SSL_R_PARSE_TLSEXT) , "parse tlsext"}, |
460 | {ERR_REASON(SSL_R_PATH_TOO_LONG) , "path too long"}, | 459 | {ERR_REASON(SSL_R_PATH_TOO_LONG) , "path too long"}, |