retain_only_sha256_of_client_certs is not part of OPENSSL_NO_BUF_FREELISTS

Change-Id: Icc848cdc62a74f6138ce17441b7dc4f0679cca81
Reviewed-on: https://boringssl-review.googlesource.com/1384
Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
Alex Chernyakhovsky 2014-08-03 15:46:36 -04:00 committed by Adam Langley
parent a324603651
commit a40c8625dd

View File

@ -1015,12 +1015,12 @@ struct ssl_ctx_st
unsigned int freelist_max_len;
struct ssl3_buf_freelist_st *wbuf_freelist;
struct ssl3_buf_freelist_st *rbuf_freelist;
#endif
/* retain_only_sha256_of_client_certs is true if we should compute the
* SHA256 hash of the peer's certifiate and then discard it to save
* memory and session space. Only effective on the server side. */
char retain_only_sha256_of_client_certs;
#endif
# ifndef OPENSSL_NO_NEXTPROTONEG
/* Next protocol negotiation information */