diff options
author | jsing <> | 2014-12-14 14:42:06 +0000 |
---|---|---|
committer | jsing <> | 2014-12-14 14:42:06 +0000 |
commit | 45a57065d1148899826db257e083825843357376 (patch) | |
tree | c2cdaf5dee151708abd8cdd369d67e62c581de59 /src | |
parent | b303e332970ffd772a791a3a52b851697dd671bc (diff) | |
download | openbsd-45a57065d1148899826db257e083825843357376.tar.gz openbsd-45a57065d1148899826db257e083825843357376.tar.bz2 openbsd-45a57065d1148899826db257e083825843357376.zip |
unifdef OPENSSL_NO_NEXTPROTONEG
Diffstat (limited to 'src')
-rw-r--r-- | src/usr.bin/openssl/apps.c | 5 | ||||
-rw-r--r-- | src/usr.bin/openssl/apps.h | 4 | ||||
-rw-r--r-- | src/usr.bin/openssl/s_client.c | 18 | ||||
-rw-r--r-- | src/usr.bin/openssl/s_server.c | 18 |
4 files changed, 4 insertions, 41 deletions
diff --git a/src/usr.bin/openssl/apps.c b/src/usr.bin/openssl/apps.c index a042f074f9..009f48652a 100644 --- a/src/usr.bin/openssl/apps.c +++ b/src/usr.bin/openssl/apps.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: apps.c,v 1.13 2014/12/03 22:16:02 bcook Exp $ */ | 1 | /* $OpenBSD: apps.c,v 1.14 2014/12/14 14:42:06 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -2163,7 +2163,6 @@ policies_print(BIO *out, X509_STORE_CTX *ctx) | |||
2163 | BIO_free(out); | 2163 | BIO_free(out); |
2164 | } | 2164 | } |
2165 | 2165 | ||
2166 | #if !defined(OPENSSL_NO_NEXTPROTONEG) | ||
2167 | /* next_protos_parse parses a comma separated list of strings into a string | 2166 | /* next_protos_parse parses a comma separated list of strings into a string |
2168 | * in a format suitable for passing to SSL_CTX_set_next_protos_advertised. | 2167 | * in a format suitable for passing to SSL_CTX_set_next_protos_advertised. |
2169 | * outlen: (output) set to the length of the resulting buffer on success. | 2168 | * outlen: (output) set to the length of the resulting buffer on success. |
@@ -2202,8 +2201,6 @@ next_protos_parse(unsigned short *outlen, const char *in) | |||
2202 | *outlen = len + 1; | 2201 | *outlen = len + 1; |
2203 | return out; | 2202 | return out; |
2204 | } | 2203 | } |
2205 | #endif | ||
2206 | /* !OPENSSL_NO_NEXTPROTONEG */ | ||
2207 | 2204 | ||
2208 | int | 2205 | int |
2209 | app_isdir(const char *name) | 2206 | app_isdir(const char *name) |
diff --git a/src/usr.bin/openssl/apps.h b/src/usr.bin/openssl/apps.h index d6b18e2a35..b2b7e85107 100644 --- a/src/usr.bin/openssl/apps.h +++ b/src/usr.bin/openssl/apps.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: apps.h,v 1.8 2014/11/07 14:16:48 jsing Exp $ */ | 1 | /* $OpenBSD: apps.h,v 1.9 2014/12/14 14:42:06 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -245,9 +245,7 @@ int do_X509_REQ_sign(BIO *err, X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md, | |||
245 | int do_X509_CRL_sign(BIO *err, X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md, | 245 | int do_X509_CRL_sign(BIO *err, X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md, |
246 | STACK_OF(OPENSSL_STRING) *sigopts); | 246 | STACK_OF(OPENSSL_STRING) *sigopts); |
247 | 247 | ||
248 | #if !defined(OPENSSL_NO_NEXTPROTONEG) | ||
249 | unsigned char *next_protos_parse(unsigned short *outlen, const char *in); | 248 | unsigned char *next_protos_parse(unsigned short *outlen, const char *in); |
250 | #endif /* !OPENSSL_NO_NEXTPROTONEG */ | ||
251 | 249 | ||
252 | #define FORMAT_UNDEF 0 | 250 | #define FORMAT_UNDEF 0 |
253 | #define FORMAT_ASN1 1 | 251 | #define FORMAT_ASN1 1 |
diff --git a/src/usr.bin/openssl/s_client.c b/src/usr.bin/openssl/s_client.c index 4476852cdb..a079c39b9e 100644 --- a/src/usr.bin/openssl/s_client.c +++ b/src/usr.bin/openssl/s_client.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s_client.c,v 1.10 2014/12/10 15:24:01 jsing Exp $ */ | 1 | /* $OpenBSD: s_client.c,v 1.11 2014/12/14 14:42:06 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -250,9 +250,7 @@ sc_usage(void) | |||
250 | BIO_printf(bio_err, " -tlsextdebug - hex dump of all TLS extensions received\n"); | 250 | BIO_printf(bio_err, " -tlsextdebug - hex dump of all TLS extensions received\n"); |
251 | BIO_printf(bio_err, " -status - request certificate status from server\n"); | 251 | BIO_printf(bio_err, " -status - request certificate status from server\n"); |
252 | BIO_printf(bio_err, " -no_ticket - disable use of RFC4507bis session tickets\n"); | 252 | BIO_printf(bio_err, " -no_ticket - disable use of RFC4507bis session tickets\n"); |
253 | #ifndef OPENSSL_NO_NEXTPROTONEG | ||
254 | BIO_printf(bio_err, " -nextprotoneg arg - enable NPN extension, considering named protocols supported (comma-separated list)\n"); | 253 | BIO_printf(bio_err, " -nextprotoneg arg - enable NPN extension, considering named protocols supported (comma-separated list)\n"); |
255 | #endif | ||
256 | BIO_printf(bio_err, " -alpn arg - enable ALPN extension, considering named protocols supported (comma-separated list)\n"); | 254 | BIO_printf(bio_err, " -alpn arg - enable ALPN extension, considering named protocols supported (comma-separated list)\n"); |
257 | #ifndef OPENSSL_NO_SRTP | 255 | #ifndef OPENSSL_NO_SRTP |
258 | BIO_printf(bio_err, " -use_srtp profiles - Offer SRTP key management with a colon-separated profile list\n"); | 256 | BIO_printf(bio_err, " -use_srtp profiles - Offer SRTP key management with a colon-separated profile list\n"); |
@@ -286,7 +284,6 @@ ssl_servername_cb(SSL * s, int *ad, void *arg) | |||
286 | char *srtp_profiles = NULL; | 284 | char *srtp_profiles = NULL; |
287 | #endif | 285 | #endif |
288 | 286 | ||
289 | #ifndef OPENSSL_NO_NEXTPROTONEG | ||
290 | /* This the context that we pass to next_proto_cb */ | 287 | /* This the context that we pass to next_proto_cb */ |
291 | typedef struct tlsextnextprotoctx_st { | 288 | typedef struct tlsextnextprotoctx_st { |
292 | unsigned char *data; | 289 | unsigned char *data; |
@@ -316,7 +313,6 @@ next_proto_cb(SSL * s, unsigned char **out, unsigned char *outlen, const unsigne | |||
316 | ctx->status = SSL_select_next_proto(out, outlen, in, inlen, ctx->data, ctx->len); | 313 | ctx->status = SSL_select_next_proto(out, outlen, in, inlen, ctx->data, ctx->len); |
317 | return SSL_TLSEXT_ERR_OK; | 314 | return SSL_TLSEXT_ERR_OK; |
318 | } | 315 | } |
319 | #endif /* ndef OPENSSL_NO_NEXTPROTONEG */ | ||
320 | 316 | ||
321 | enum { | 317 | enum { |
322 | PROTO_OFF = 0, | 318 | PROTO_OFF = 0, |
@@ -372,9 +368,7 @@ s_client_main(int argc, char **argv) | |||
372 | char *servername = NULL; | 368 | char *servername = NULL; |
373 | tlsextctx tlsextcbp = | 369 | tlsextctx tlsextcbp = |
374 | {NULL, 0}; | 370 | {NULL, 0}; |
375 | #ifndef OPENSSL_NO_NEXTPROTONEG | ||
376 | const char *next_proto_neg_in = NULL; | 371 | const char *next_proto_neg_in = NULL; |
377 | #endif | ||
378 | const char *alpn_in = NULL; | 372 | const char *alpn_in = NULL; |
379 | char *sess_in = NULL; | 373 | char *sess_in = NULL; |
380 | char *sess_out = NULL; | 374 | char *sess_out = NULL; |
@@ -539,13 +533,11 @@ s_client_main(int argc, char **argv) | |||
539 | else if (strcmp(*argv, "-no_ticket") == 0) { | 533 | else if (strcmp(*argv, "-no_ticket") == 0) { |
540 | off |= SSL_OP_NO_TICKET; | 534 | off |= SSL_OP_NO_TICKET; |
541 | } | 535 | } |
542 | #ifndef OPENSSL_NO_NEXTPROTONEG | ||
543 | else if (strcmp(*argv, "-nextprotoneg") == 0) { | 536 | else if (strcmp(*argv, "-nextprotoneg") == 0) { |
544 | if (--argc < 1) | 537 | if (--argc < 1) |
545 | goto bad; | 538 | goto bad; |
546 | next_proto_neg_in = *(++argv); | 539 | next_proto_neg_in = *(++argv); |
547 | } | 540 | } |
548 | #endif | ||
549 | else if (strcmp(*argv, "-alpn") == 0) { | 541 | else if (strcmp(*argv, "-alpn") == 0) { |
550 | if (--argc < 1) | 542 | if (--argc < 1) |
551 | goto bad; | 543 | goto bad; |
@@ -642,7 +634,6 @@ bad: | |||
642 | goto end; | 634 | goto end; |
643 | } | 635 | } |
644 | 636 | ||
645 | #if !defined(OPENSSL_NO_NEXTPROTONEG) | ||
646 | next_proto.status = -1; | 637 | next_proto.status = -1; |
647 | if (next_proto_neg_in) { | 638 | if (next_proto_neg_in) { |
648 | next_proto.data = next_protos_parse(&next_proto.len, next_proto_neg_in); | 639 | next_proto.data = next_protos_parse(&next_proto.len, next_proto_neg_in); |
@@ -652,7 +643,6 @@ bad: | |||
652 | } | 643 | } |
653 | } else | 644 | } else |
654 | next_proto.data = NULL; | 645 | next_proto.data = NULL; |
655 | #endif | ||
656 | 646 | ||
657 | #ifndef OPENSSL_NO_ENGINE | 647 | #ifndef OPENSSL_NO_ENGINE |
658 | e = setup_engine(bio_err, engine_id, 1); | 648 | e = setup_engine(bio_err, engine_id, 1); |
@@ -738,10 +728,8 @@ bad: | |||
738 | if (socket_type == SOCK_DGRAM) | 728 | if (socket_type == SOCK_DGRAM) |
739 | SSL_CTX_set_read_ahead(ctx, 1); | 729 | SSL_CTX_set_read_ahead(ctx, 1); |
740 | 730 | ||
741 | #if !defined(OPENSSL_NO_NEXTPROTONEG) | ||
742 | if (next_proto.data) | 731 | if (next_proto.data) |
743 | SSL_CTX_set_next_proto_select_cb(ctx, next_proto_cb, &next_proto); | 732 | SSL_CTX_set_next_proto_select_cb(ctx, next_proto_cb, &next_proto); |
744 | #endif | ||
745 | if (alpn_in) { | 733 | if (alpn_in) { |
746 | unsigned short alpn_len; | 734 | unsigned short alpn_len; |
747 | unsigned char *alpn = next_protos_parse(&alpn_len, alpn_in); | 735 | unsigned char *alpn = next_protos_parse(&alpn_len, alpn_in); |
@@ -1274,9 +1262,7 @@ end: | |||
1274 | print_stuff(bio_c_out, con, 1); | 1262 | print_stuff(bio_c_out, con, 1); |
1275 | SSL_free(con); | 1263 | SSL_free(con); |
1276 | } | 1264 | } |
1277 | #if !defined(OPENSSL_NO_NEXTPROTONEG) | ||
1278 | free(next_proto.data); | 1265 | free(next_proto.data); |
1279 | #endif | ||
1280 | if (ctx != NULL) | 1266 | if (ctx != NULL) |
1281 | SSL_CTX_free(ctx); | 1267 | SSL_CTX_free(ctx); |
1282 | if (cert) | 1268 | if (cert) |
@@ -1430,7 +1416,6 @@ print_stuff(BIO * bio, SSL * s, int full) | |||
1430 | } | 1416 | } |
1431 | #endif | 1417 | #endif |
1432 | 1418 | ||
1433 | #if !defined(OPENSSL_NO_NEXTPROTONEG) | ||
1434 | if (next_proto.status != -1) { | 1419 | if (next_proto.status != -1) { |
1435 | const unsigned char *proto; | 1420 | const unsigned char *proto; |
1436 | unsigned int proto_len; | 1421 | unsigned int proto_len; |
@@ -1439,7 +1424,6 @@ print_stuff(BIO * bio, SSL * s, int full) | |||
1439 | BIO_write(bio, proto, proto_len); | 1424 | BIO_write(bio, proto, proto_len); |
1440 | BIO_write(bio, "\n", 1); | 1425 | BIO_write(bio, "\n", 1); |
1441 | } | 1426 | } |
1442 | #endif | ||
1443 | { | 1427 | { |
1444 | const unsigned char *proto; | 1428 | const unsigned char *proto; |
1445 | unsigned int proto_len; | 1429 | unsigned int proto_len; |
diff --git a/src/usr.bin/openssl/s_server.c b/src/usr.bin/openssl/s_server.c index 35ed6d169c..fdd93977e8 100644 --- a/src/usr.bin/openssl/s_server.c +++ b/src/usr.bin/openssl/s_server.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s_server.c,v 1.8 2014/12/10 15:24:01 jsing Exp $ */ | 1 | /* $OpenBSD: s_server.c,v 1.9 2014/12/14 14:42:06 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -348,9 +348,7 @@ sv_usage(void) | |||
348 | BIO_printf(bio_err, " not specified (default is %s)\n", TEST_CERT2); | 348 | BIO_printf(bio_err, " not specified (default is %s)\n", TEST_CERT2); |
349 | BIO_printf(bio_err, " -tlsextdebug - hex dump of all TLS extensions received\n"); | 349 | BIO_printf(bio_err, " -tlsextdebug - hex dump of all TLS extensions received\n"); |
350 | BIO_printf(bio_err, " -no_ticket - disable use of RFC4507bis session tickets\n"); | 350 | BIO_printf(bio_err, " -no_ticket - disable use of RFC4507bis session tickets\n"); |
351 | #ifndef OPENSSL_NO_NEXTPROTONEG | ||
352 | BIO_printf(bio_err, " -nextprotoneg arg - set the advertised protocols for the NPN extension (comma-separated list)\n"); | 351 | BIO_printf(bio_err, " -nextprotoneg arg - set the advertised protocols for the NPN extension (comma-separated list)\n"); |
353 | #endif | ||
354 | BIO_printf(bio_err," -alpn arg - set the advertised protocols for the ALPN extension (comma-separated list)\n"); | 352 | BIO_printf(bio_err," -alpn arg - set the advertised protocols for the ALPN extension (comma-separated list)\n"); |
355 | #ifndef OPENSSL_NO_SRTP | 353 | #ifndef OPENSSL_NO_SRTP |
356 | BIO_printf(bio_err, " -use_srtp profiles - Offer SRTP key management with a colon-separated profile list\n"); | 354 | BIO_printf(bio_err, " -use_srtp profiles - Offer SRTP key management with a colon-separated profile list\n"); |
@@ -526,7 +524,6 @@ err: | |||
526 | goto done; | 524 | goto done; |
527 | } | 525 | } |
528 | 526 | ||
529 | #ifndef OPENSSL_NO_NEXTPROTONEG | ||
530 | /* This is the context that we pass to next_proto_cb */ | 527 | /* This is the context that we pass to next_proto_cb */ |
531 | typedef struct tlsextnextprotoctx_st { | 528 | typedef struct tlsextnextprotoctx_st { |
532 | unsigned char *data; | 529 | unsigned char *data; |
@@ -543,7 +540,6 @@ next_proto_cb(SSL * s, const unsigned char **data, unsigned int *len, void *arg) | |||
543 | 540 | ||
544 | return SSL_TLSEXT_ERR_OK; | 541 | return SSL_TLSEXT_ERR_OK; |
545 | } | 542 | } |
546 | #endif /* ndef OPENSSL_NO_NEXTPROTONEG */ | ||
547 | 543 | ||
548 | 544 | ||
549 | /* This the context that we pass to alpn_cb */ | 545 | /* This the context that we pass to alpn_cb */ |
@@ -621,10 +617,8 @@ s_server_main(int argc, char *argv[]) | |||
621 | EVP_PKEY *s_key2 = NULL; | 617 | EVP_PKEY *s_key2 = NULL; |
622 | X509 *s_cert2 = NULL; | 618 | X509 *s_cert2 = NULL; |
623 | tlsextctx tlsextcbp = {NULL, NULL, SSL_TLSEXT_ERR_ALERT_WARNING}; | 619 | tlsextctx tlsextcbp = {NULL, NULL, SSL_TLSEXT_ERR_ALERT_WARNING}; |
624 | #ifndef OPENSSL_NO_NEXTPROTONEG | ||
625 | const char *next_proto_neg_in = NULL; | 620 | const char *next_proto_neg_in = NULL; |
626 | tlsextnextprotoctx next_proto = { NULL, 0 }; | 621 | tlsextnextprotoctx next_proto = { NULL, 0 }; |
627 | #endif | ||
628 | const char *alpn_in = NULL; | 622 | const char *alpn_in = NULL; |
629 | tlsextalpnctx alpn_ctx = { NULL, 0 }; | 623 | tlsextalpnctx alpn_ctx = { NULL, 0 }; |
630 | meth = SSLv23_server_method(); | 624 | meth = SSLv23_server_method(); |
@@ -873,13 +867,11 @@ s_server_main(int argc, char *argv[]) | |||
873 | goto bad; | 867 | goto bad; |
874 | s_key_file2 = *(++argv); | 868 | s_key_file2 = *(++argv); |
875 | } | 869 | } |
876 | #ifndef OPENSSL_NO_NEXTPROTONEG | ||
877 | else if (strcmp(*argv, "-nextprotoneg") == 0) { | 870 | else if (strcmp(*argv, "-nextprotoneg") == 0) { |
878 | if (--argc < 1) | 871 | if (--argc < 1) |
879 | goto bad; | 872 | goto bad; |
880 | next_proto_neg_in = *(++argv); | 873 | next_proto_neg_in = *(++argv); |
881 | } | 874 | } |
882 | #endif | ||
883 | else if (strcmp(*argv,"-alpn") == 0) { | 875 | else if (strcmp(*argv,"-alpn") == 0) { |
884 | if (--argc < 1) | 876 | if (--argc < 1) |
885 | goto bad; | 877 | goto bad; |
@@ -963,7 +955,6 @@ bad: | |||
963 | } | 955 | } |
964 | } | 956 | } |
965 | } | 957 | } |
966 | #if !defined(OPENSSL_NO_NEXTPROTONEG) | ||
967 | if (next_proto_neg_in) { | 958 | if (next_proto_neg_in) { |
968 | unsigned short len; | 959 | unsigned short len; |
969 | next_proto.data = next_protos_parse(&len, next_proto_neg_in); | 960 | next_proto.data = next_protos_parse(&len, next_proto_neg_in); |
@@ -973,7 +964,6 @@ bad: | |||
973 | } else { | 964 | } else { |
974 | next_proto.data = NULL; | 965 | next_proto.data = NULL; |
975 | } | 966 | } |
976 | #endif | ||
977 | alpn_ctx.data = NULL; | 967 | alpn_ctx.data = NULL; |
978 | if (alpn_in) { | 968 | if (alpn_in) { |
979 | unsigned short len; | 969 | unsigned short len; |
@@ -1125,10 +1115,8 @@ bad: | |||
1125 | if (vpm) | 1115 | if (vpm) |
1126 | SSL_CTX_set1_param(ctx2, vpm); | 1116 | SSL_CTX_set1_param(ctx2, vpm); |
1127 | } | 1117 | } |
1128 | #ifndef OPENSSL_NO_NEXTPROTONEG | ||
1129 | if (next_proto.data) | 1118 | if (next_proto.data) |
1130 | SSL_CTX_set_next_protos_advertised_cb(ctx, next_proto_cb, &next_proto); | 1119 | SSL_CTX_set_next_protos_advertised_cb(ctx, next_proto_cb, &next_proto); |
1131 | #endif | ||
1132 | if (alpn_ctx.data) | 1120 | if (alpn_ctx.data) |
1133 | SSL_CTX_set_alpn_select_cb(ctx, alpn_cb, &alpn_ctx); | 1121 | SSL_CTX_set_alpn_select_cb(ctx, alpn_cb, &alpn_ctx); |
1134 | 1122 | ||
@@ -1660,10 +1648,8 @@ init_ssl_connection(SSL * con) | |||
1660 | X509 *peer; | 1648 | X509 *peer; |
1661 | long verify_error; | 1649 | long verify_error; |
1662 | char buf[BUFSIZ]; | 1650 | char buf[BUFSIZ]; |
1663 | #if !defined(OPENSSL_NO_NEXTPROTONEG) | ||
1664 | const unsigned char *next_proto_neg; | 1651 | const unsigned char *next_proto_neg; |
1665 | unsigned next_proto_neg_len; | 1652 | unsigned next_proto_neg_len; |
1666 | #endif | ||
1667 | unsigned char *exportedkeymat; | 1653 | unsigned char *exportedkeymat; |
1668 | 1654 | ||
1669 | i = SSL_accept(con); | 1655 | i = SSL_accept(con); |
@@ -1698,14 +1684,12 @@ init_ssl_connection(SSL * con) | |||
1698 | str = SSL_CIPHER_get_name(SSL_get_current_cipher(con)); | 1684 | str = SSL_CIPHER_get_name(SSL_get_current_cipher(con)); |
1699 | BIO_printf(bio_s_out, "CIPHER is %s\n", (str != NULL) ? str : "(NONE)"); | 1685 | BIO_printf(bio_s_out, "CIPHER is %s\n", (str != NULL) ? str : "(NONE)"); |
1700 | 1686 | ||
1701 | #if !defined(OPENSSL_NO_NEXTPROTONEG) | ||
1702 | SSL_get0_next_proto_negotiated(con, &next_proto_neg, &next_proto_neg_len); | 1687 | SSL_get0_next_proto_negotiated(con, &next_proto_neg, &next_proto_neg_len); |
1703 | if (next_proto_neg) { | 1688 | if (next_proto_neg) { |
1704 | BIO_printf(bio_s_out, "NEXTPROTO is "); | 1689 | BIO_printf(bio_s_out, "NEXTPROTO is "); |
1705 | BIO_write(bio_s_out, next_proto_neg, next_proto_neg_len); | 1690 | BIO_write(bio_s_out, next_proto_neg, next_proto_neg_len); |
1706 | BIO_printf(bio_s_out, "\n"); | 1691 | BIO_printf(bio_s_out, "\n"); |
1707 | } | 1692 | } |
1708 | #endif | ||
1709 | #ifndef OPENSSL_NO_SRTP | 1693 | #ifndef OPENSSL_NO_SRTP |
1710 | { | 1694 | { |
1711 | SRTP_PROTECTION_PROFILE *srtp_profile | 1695 | SRTP_PROTECTION_PROFILE *srtp_profile |