Add dummy |SSL_get_server_tmp_key|.
Node.js calls it but handles it failing. Since we have abstracted this in the state machine, we mightn't even be using a cipher suite where the server's key can be expressed as an EVP_PKEY. Change-Id: Ic3f013dc9bcd7170a9eb2c7535378d478b985849 Reviewed-on: https://boringssl-review.googlesource.com/7272 Reviewed-by: David Benjamin <davidben@google.com>
This commit is contained in:
parent
d323f4b1e1
commit
29ec5d1fda
@ -3148,6 +3148,9 @@ OPENSSL_EXPORT const COMP_METHOD *SSL_get_current_compression(SSL *s);
|
||||
/* SSL_get_current_expansion returns NULL. */
|
||||
OPENSSL_EXPORT const COMP_METHOD *SSL_get_current_expansion(SSL *s);
|
||||
|
||||
/* SSL_get_server_tmp_key returns zero. */
|
||||
OPENSSL_EXPORT int *SSL_get_server_tmp_key(SSL *ssl, EVP_PKEY **out_key);
|
||||
|
||||
#define SSL_set_app_data(s, arg) (SSL_set_ex_data(s, 0, (char *)arg))
|
||||
#define SSL_get_app_data(s) (SSL_get_ex_data(s, 0))
|
||||
#define SSL_SESSION_set_app_data(s, a) \
|
||||
|
@ -1859,6 +1859,8 @@ const COMP_METHOD *SSL_get_current_compression(SSL *ssl) { return NULL; }
|
||||
|
||||
const COMP_METHOD *SSL_get_current_expansion(SSL *ssl) { return NULL; }
|
||||
|
||||
int *SSL_get_server_tmp_key(SSL *ssl, EVP_PKEY **out_key) { return 0; }
|
||||
|
||||
int ssl_init_wbio_buffer(SSL *ssl, int push) {
|
||||
BIO *bbio;
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user