Remove old 'prepare' extensions functions.
These are no-ops now. Change-Id: Ib842d512571a06a45e52f30fe4bb8e98e9c37cf9 Reviewed-on: https://boringssl-review.googlesource.com/5481 Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
parent
422fe08672
commit
821464e45f
@ -1077,8 +1077,6 @@ uint8_t *ssl_add_serverhello_tlsext(SSL *s, uint8_t *const buf,
|
||||
uint8_t *const limit);
|
||||
int ssl_parse_clienthello_tlsext(SSL *s, CBS *cbs);
|
||||
int ssl_parse_serverhello_tlsext(SSL *s, CBS *cbs);
|
||||
int ssl_prepare_clienthello_tlsext(SSL *s);
|
||||
int ssl_prepare_serverhello_tlsext(SSL *s);
|
||||
|
||||
#define tlsext_tick_md EVP_sha256
|
||||
|
||||
|
@ -693,11 +693,6 @@ int ssl3_send_client_hello(SSL *s) {
|
||||
*(p++) = 0; /* Add the NULL method */
|
||||
|
||||
/* TLS extensions*/
|
||||
if (ssl_prepare_clienthello_tlsext(s) <= 0) {
|
||||
OPENSSL_PUT_ERROR(SSL, SSL_R_CLIENTHELLO_TLSEXT);
|
||||
goto err;
|
||||
}
|
||||
|
||||
p = ssl_add_clienthello_tlsext(s, p, buf + SSL3_RT_MAX_PLAIN_LENGTH,
|
||||
p - buf);
|
||||
if (p == NULL) {
|
||||
|
@ -1207,10 +1207,7 @@ int ssl3_send_server_hello(SSL *s) {
|
||||
|
||||
/* put the compression method */
|
||||
*(p++) = 0;
|
||||
if (ssl_prepare_serverhello_tlsext(s) <= 0) {
|
||||
OPENSSL_PUT_ERROR(SSL, SSL_R_SERVERHELLO_TLSEXT);
|
||||
return -1;
|
||||
}
|
||||
|
||||
p = ssl_add_serverhello_tlsext(s, p, buf + SSL3_RT_MAX_PLAIN_LENGTH);
|
||||
if (p == NULL) {
|
||||
OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR);
|
||||
|
@ -2535,10 +2535,6 @@ static int ssl_scan_serverhello_tlsext(SSL *s, CBS *cbs, int *out_alert) {
|
||||
return 1;
|
||||
}
|
||||
|
||||
int ssl_prepare_clienthello_tlsext(SSL *s) { return 1; }
|
||||
|
||||
int ssl_prepare_serverhello_tlsext(SSL *s) { return 1; }
|
||||
|
||||
static int ssl_check_clienthello_tlsext(SSL *s) {
|
||||
int ret = SSL_TLSEXT_ERR_NOACK;
|
||||
int al = SSL_AD_UNRECOGNIZED_NAME;
|
||||
|
Loading…
Reference in New Issue
Block a user