summaryrefslogtreecommitdiffstats
path: root/ssl/statem/statem.h
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2017-04-20 15:13:28 +0100
committerMatt Caswell <matt@openssl.org>2017-04-25 11:13:39 +0100
commitbd79bcb42bab120575fc398692b7b61b1c5e6ed2 (patch)
treec7a3622d3da971372d037319ea956193a837ab6e /ssl/statem/statem.h
parentc4666bfa13480c1e700a0d487300da2a56e889af (diff)
Remove special case code for SCTP reneg handling
There was code existing which attempted to handle the case where application data is received after a reneg handshake has started in SCTP. In normal DTLS we just fail the connection if this occurs, so there doesn't seem any reason to try and work around it for SCTP. In practice it didn't work properly anyway and is probably a bad idea to start with. Fixes #3251 Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/3286)
Diffstat (limited to 'ssl/statem/statem.h')
-rw-r--r--ssl/statem/statem.h7
1 files changed, 0 insertions, 7 deletions
diff --git a/ssl/statem/statem.h b/ssl/statem/statem.h
index 7012115c49..98c82917f3 100644
--- a/ssl/statem/statem.h
+++ b/ssl/statem/statem.h
@@ -100,9 +100,6 @@ struct ossl_statem_st {
/* Should we skip the CertificateVerify message? */
unsigned int no_cert_verify;
int use_timer;
-#ifndef OPENSSL_NO_SCTP
- int in_sctp_read_sock;
-#endif
};
typedef struct ossl_statem_st OSSL_STATEM;
@@ -126,7 +123,3 @@ __owur int ossl_statem_skip_early_data(SSL *s);
void ossl_statem_check_finish_init(SSL *s, int send);
void ossl_statem_set_hello_verify_done(SSL *s);
__owur int ossl_statem_app_data_allowed(SSL *s);
-#ifndef OPENSSL_NO_SCTP
-void ossl_statem_set_sctp_read_sock(SSL *s, int read_sock);
-__owur int ossl_statem_in_sctp_read_sock(SSL *s);
-#endif