Remove session_tickets_sent.

This is a remnant of before we made the handshake write
flight by flight.

Change-Id: I94c0105bb071ffca9ff5aa4c4bf43311c750b49a
Reviewed-on: https://boringssl-review.googlesource.com/14369
Reviewed-by: Steven Valdez <svaldez@chromium.org>
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: Steven Valdez <svaldez@chromium.org>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
This commit is contained in:
David Benjamin 2017-03-25 20:15:34 -05:00 committed by CQ bot account: commit-bot@chromium.org
parent 7ce10d5da7
commit 3cb12467cc
2 changed files with 0 additions and 5 deletions

View File

@ -1074,10 +1074,6 @@ struct ssl_handshake_st {
uint8_t *key_block; uint8_t *key_block;
uint8_t key_block_len; uint8_t key_block_len;
/* session_tickets_sent, in TLS 1.3, is the number of tickets the server has
* sent. */
uint8_t session_tickets_sent;
/* scts_requested is one if the SCT extension is in the ClientHello. */ /* scts_requested is one if the SCT extension is in the ClientHello. */
unsigned scts_requested:1; unsigned scts_requested:1;

View File

@ -735,7 +735,6 @@ static enum ssl_hs_wait_t do_send_new_session_ticket(SSL_HANDSHAKE *hs) {
} }
} }
hs->session_tickets_sent++;
hs->tls13_state = state_done; hs->tls13_state = state_done;
return ssl_hs_flush; return ssl_hs_flush;