Add dummy variables to keep wpa_supplicant happy.
Since we can't update wpa_supplicant nearly as fast as we would like, we need to try and keep it happy. Unfortunately, the recent switch to EVP_AEAD breaks it so this dismal change adds some dummy variables that will allow it to compile. Change-Id: I03d6b81c30bbebc07af3af0d6cda85a26b461edf Reviewed-on: https://boringssl-review.googlesource.com/2960 Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
parent
384673ceb7
commit
66850ddec1
@ -1377,6 +1377,12 @@ struct ssl_st
|
||||
* bytes. This ensures that the cellular radio is fast forwarded to DCH
|
||||
* (high data rate) state in 3G networks. */
|
||||
char fastradio_padding;
|
||||
|
||||
/* These fields are always NULL and exist only to keep wpa_supplicant
|
||||
* happy about the change to EVP_AEAD. They are only needed for
|
||||
* EAP-FAST, which we don't support. */
|
||||
EVP_CIPHER_CTX *enc_read_ctx;
|
||||
EVP_MD_CTX *read_hash;
|
||||
};
|
||||
|
||||
#endif
|
||||
|
@ -502,6 +502,11 @@ typedef struct ssl3_state_st
|
||||
/* Client-only: peer_psk_identity_hint is the psk_identity_hint
|
||||
* sent by the server when using a PSK key exchange. */
|
||||
char *peer_psk_identity_hint;
|
||||
|
||||
/* new_mac_secret_size is unused and exists only until
|
||||
* wpa_supplicant can be updated. It is only needed for
|
||||
* EAP-FAST, which we don't support. */
|
||||
uint8_t new_mac_secret_size;
|
||||
} tmp;
|
||||
|
||||
/* Connection binding to prevent renegotiation attacks */
|
||||
|
Loading…
Reference in New Issue
Block a user