Add dummy variables to keep wpa_supplicant happy.
Since we can't update wpa_supplicant nearly as fast as we would like, we need to try and keep it happy. Unfortunately, the recent switch to EVP_AEAD breaks it so this dismal change adds some dummy variables that will allow it to compile. Change-Id: I03d6b81c30bbebc07af3af0d6cda85a26b461edf Reviewed-on: https://boringssl-review.googlesource.com/2960 Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
parent
384673ceb7
commit
66850ddec1
@ -1377,6 +1377,12 @@ struct ssl_st
|
|||||||
* bytes. This ensures that the cellular radio is fast forwarded to DCH
|
* bytes. This ensures that the cellular radio is fast forwarded to DCH
|
||||||
* (high data rate) state in 3G networks. */
|
* (high data rate) state in 3G networks. */
|
||||||
char fastradio_padding;
|
char fastradio_padding;
|
||||||
|
|
||||||
|
/* These fields are always NULL and exist only to keep wpa_supplicant
|
||||||
|
* happy about the change to EVP_AEAD. They are only needed for
|
||||||
|
* EAP-FAST, which we don't support. */
|
||||||
|
EVP_CIPHER_CTX *enc_read_ctx;
|
||||||
|
EVP_MD_CTX *read_hash;
|
||||||
};
|
};
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
@ -502,6 +502,11 @@ typedef struct ssl3_state_st
|
|||||||
/* Client-only: peer_psk_identity_hint is the psk_identity_hint
|
/* Client-only: peer_psk_identity_hint is the psk_identity_hint
|
||||||
* sent by the server when using a PSK key exchange. */
|
* sent by the server when using a PSK key exchange. */
|
||||||
char *peer_psk_identity_hint;
|
char *peer_psk_identity_hint;
|
||||||
|
|
||||||
|
/* new_mac_secret_size is unused and exists only until
|
||||||
|
* wpa_supplicant can be updated. It is only needed for
|
||||||
|
* EAP-FAST, which we don't support. */
|
||||||
|
uint8_t new_mac_secret_size;
|
||||||
} tmp;
|
} tmp;
|
||||||
|
|
||||||
/* Connection binding to prevent renegotiation attacks */
|
/* Connection binding to prevent renegotiation attacks */
|
||||||
|
Loading…
Reference in New Issue
Block a user