Unwind unnecessary Android hacks.
wpa_supplicant in AOSP has now been updated, so these all can go. We're just left with the AES keywrap business. Change-Id: Ie4c3e08902a2a1f9b43e1907116c7d85791ad5e9 Reviewed-on: https://boringssl-review.googlesource.com/11160 Reviewed-by: Steven Valdez <svaldez@google.com> Reviewed-by: David Benjamin <davidben@google.com> Commit-Queue: David Benjamin <davidben@google.com> CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
This commit is contained in:
parent
e63d9d7625
commit
28d938d4c3
@ -739,14 +739,6 @@ OPENSSL_EXPORT int BIO_zero_copy_get_write_buf_done(BIO* bio,
|
||||
#define BIO_CTRL_DUP 12
|
||||
|
||||
|
||||
/* Android compatibility section.
|
||||
*
|
||||
* A previous version of BoringSSL used in Android renamed ERR_print_errors_fp
|
||||
* to BIO_print_errors_fp. It has subsequently been renamed back to
|
||||
* ERR_print_errors_fp. */
|
||||
#define BIO_print_errors_fp ERR_print_errors_fp
|
||||
|
||||
|
||||
/* Deprecated functions. */
|
||||
|
||||
/* BIO_f_base64 returns a filter |BIO| that base64-encodes data written into
|
||||
|
@ -158,9 +158,6 @@
|
||||
#include <sys/time.h>
|
||||
#endif
|
||||
|
||||
/* wpa_supplicant expects to get the version functions from ssl.h */
|
||||
#include <openssl/crypto.h>
|
||||
|
||||
/* Forward-declare struct timeval. On Windows, it is defined in winsock2.h and
|
||||
* Windows headers define too many macros to be included in public headers.
|
||||
* However, only a forward declaration is needed. */
|
||||
@ -1589,15 +1586,11 @@ OPENSSL_EXPORT long SSL_SESSION_get_timeout(const SSL_SESSION *session);
|
||||
* TODO(davidben): This should return a const X509 *. */
|
||||
OPENSSL_EXPORT X509 *SSL_SESSION_get0_peer(const SSL_SESSION *session);
|
||||
|
||||
/* TODO(davidben): Remove this when wpa_supplicant in Android has synced with
|
||||
* upstream. */
|
||||
#if !defined(BORINGSSL_SUPPRESS_ACCESSORS)
|
||||
/* SSL_SESSION_get_master_key writes up to |max_out| bytes of |session|'s master
|
||||
* secret to |out| and returns the number of bytes written. If |max_out| is
|
||||
* zero, it returns the size of the master secret. */
|
||||
OPENSSL_EXPORT size_t SSL_SESSION_get_master_key(const SSL_SESSION *session,
|
||||
uint8_t *out, size_t max_out);
|
||||
#endif
|
||||
|
||||
/* SSL_SESSION_set_time sets |session|'s creation time to |time| and returns
|
||||
* |time|. This function may be useful in writing tests but otherwise should not
|
||||
@ -3076,9 +3069,6 @@ OPENSSL_EXPORT int SSL_get_shutdown(const SSL *ssl);
|
||||
* peer. If not applicable, it returns zero. */
|
||||
OPENSSL_EXPORT uint16_t SSL_get_peer_signature_algorithm(const SSL *ssl);
|
||||
|
||||
/* TODO(davidben): Remove this when wpa_supplicant in Android has synced with
|
||||
* upstream. */
|
||||
#if !defined(BORINGSSL_SUPPRESS_ACCESSORS)
|
||||
/* SSL_get_client_random writes up to |max_out| bytes of the most recent
|
||||
* handshake's client_random to |out| and returns the number of bytes written.
|
||||
* If |max_out| is zero, it returns the size of the client_random. */
|
||||
@ -3090,7 +3080,6 @@ OPENSSL_EXPORT size_t SSL_get_client_random(const SSL *ssl, uint8_t *out,
|
||||
* If |max_out| is zero, it returns the size of the server_random. */
|
||||
OPENSSL_EXPORT size_t SSL_get_server_random(const SSL *ssl, uint8_t *out,
|
||||
size_t max_out);
|
||||
#endif
|
||||
|
||||
/* SSL_get_pending_cipher returns the cipher suite for the current handshake or
|
||||
* NULL if one has not been negotiated yet or there is no pending handshake. */
|
||||
@ -4157,12 +4146,6 @@ struct ssl_st {
|
||||
/* renegotiate_mode controls how peer renegotiation attempts are handled. */
|
||||
enum ssl_renegotiate_mode_t renegotiate_mode;
|
||||
|
||||
/* These fields are always NULL and exist only to keep wpa_supplicant happy
|
||||
* about the change to EVP_AEAD. They are only needed for EAP-FAST, which we
|
||||
* don't support. */
|
||||
EVP_CIPHER_CTX *enc_read_ctx;
|
||||
EVP_MD_CTX *read_hash;
|
||||
|
||||
/* verify_mode is a bitmask of |SSL_VERIFY_*| values. */
|
||||
uint8_t verify_mode;
|
||||
|
||||
@ -4398,10 +4381,6 @@ typedef struct ssl3_state_st {
|
||||
* didn't use it to create the master secret initially. */
|
||||
char extended_master_secret;
|
||||
|
||||
/* new_mac_secret_size is unused and exists only until wpa_supplicant can
|
||||
* be updated. It is only needed for EAP-FAST, which we don't support. */
|
||||
uint8_t new_mac_secret_size;
|
||||
|
||||
/* Client-only: in_false_start is one if there is a pending handshake in
|
||||
* False Start. The client may write data at this point. */
|
||||
char in_false_start;
|
||||
@ -4476,19 +4455,6 @@ typedef struct ssl3_state_st {
|
||||
} SSL3_STATE;
|
||||
|
||||
|
||||
/* Android compatibility section (hidden).
|
||||
*
|
||||
* These functions are declared, temporarily, for Android because
|
||||
* wpa_supplicant will take a little time to sync with upstream. Outside of
|
||||
* Android they'll have no definition. */
|
||||
|
||||
OPENSSL_EXPORT int SSL_set_session_ticket_ext(SSL *s, void *ext_data,
|
||||
int ext_len);
|
||||
OPENSSL_EXPORT int SSL_set_session_secret_cb(SSL *s, void *cb, void *arg);
|
||||
OPENSSL_EXPORT int SSL_set_session_ticket_ext_cb(SSL *s, void *cb, void *arg);
|
||||
OPENSSL_EXPORT int SSL_set_ssl_method(SSL *s, const SSL_METHOD *method);
|
||||
|
||||
|
||||
/* Nodejs compatibility section (hidden).
|
||||
*
|
||||
* These defines exist for node.js, with the hope that we can eliminate the
|
||||
|
@ -79,7 +79,7 @@ class Android(object):
|
||||
"""
|
||||
|
||||
def ExtraFiles(self):
|
||||
return ['android_compat_hacks.c', 'android_compat_keywrap.c']
|
||||
return ['android_compat_keywrap.c']
|
||||
|
||||
def PrintVariableSection(self, out, name, files):
|
||||
out.write('%s := \\\n' % name)
|
||||
|
Loading…
Reference in New Issue
Block a user