Add dummy variables to keep wpa_supplicant happy.

Since we can't update wpa_supplicant nearly as fast as we would like, we
need to try and keep it happy. Unfortunately, the recent switch to
EVP_AEAD breaks it so this dismal change adds some dummy variables that
will allow it to compile.

Change-Id: I03d6b81c30bbebc07af3af0d6cda85a26b461edf
Reviewed-on: https://boringssl-review.googlesource.com/2960
Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
Adam Langley 2015-01-20 18:47:14 -08:00
parent 384673ceb7
commit 66850ddec1
2 changed files with 11 additions and 0 deletions

View File

@ -1377,6 +1377,12 @@ struct ssl_st
* bytes. This ensures that the cellular radio is fast forwarded to DCH * bytes. This ensures that the cellular radio is fast forwarded to DCH
* (high data rate) state in 3G networks. */ * (high data rate) state in 3G networks. */
char fastradio_padding; char fastradio_padding;
/* These fields are always NULL and exist only to keep wpa_supplicant
* happy about the change to EVP_AEAD. They are only needed for
* EAP-FAST, which we don't support. */
EVP_CIPHER_CTX *enc_read_ctx;
EVP_MD_CTX *read_hash;
}; };
#endif #endif

View File

@ -502,6 +502,11 @@ typedef struct ssl3_state_st
/* Client-only: peer_psk_identity_hint is the psk_identity_hint /* Client-only: peer_psk_identity_hint is the psk_identity_hint
* sent by the server when using a PSK key exchange. */ * sent by the server when using a PSK key exchange. */
char *peer_psk_identity_hint; char *peer_psk_identity_hint;
/* new_mac_secret_size is unused and exists only until
* wpa_supplicant can be updated. It is only needed for
* EAP-FAST, which we don't support. */
uint8_t new_mac_secret_size;
} tmp; } tmp;
/* Connection binding to prevent renegotiation attacks */ /* Connection binding to prevent renegotiation attacks */