|
@@ -721,6 +721,7 @@ int tls_parse_ctos_key_share(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
|
int tls_parse_ctos_cookie(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
|
size_t chainidx)
|
|
|
{
|
|
|
+#ifndef OPENSSL_NO_TLS1_3
|
|
|
unsigned int format, version, key_share, group_id;
|
|
|
EVP_MD_CTX *hctx;
|
|
|
EVP_PKEY *pkey;
|
|
@@ -936,6 +937,7 @@ int tls_parse_ctos_cookie(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
|
s->hello_retry_request = 1;
|
|
|
|
|
|
s->ext.cookieok = 1;
|
|
|
+#endif
|
|
|
|
|
|
return 1;
|
|
|
}
|
|
@@ -1694,14 +1696,16 @@ EXT_RETURN tls_construct_stoc_key_share(SSL *s, WPACKET *pkt,
|
|
|
/* SSLfatal() already called */
|
|
|
return EXT_RETURN_FAIL;
|
|
|
}
|
|
|
-#endif
|
|
|
-
|
|
|
return EXT_RETURN_SENT;
|
|
|
+#else
|
|
|
+ return EXT_RETURN_FAIL;
|
|
|
+#endif
|
|
|
}
|
|
|
|
|
|
EXT_RETURN tls_construct_stoc_cookie(SSL *s, WPACKET *pkt, unsigned int context,
|
|
|
X509 *x, size_t chainidx)
|
|
|
{
|
|
|
+#ifndef OPENSSL_NO_TLS1_3
|
|
|
unsigned char *hashval1, *hashval2, *appcookie1, *appcookie2, *cookie;
|
|
|
unsigned char *hmac, *hmac2;
|
|
|
size_t startlen, ciphlen, totcookielen, hashlen, hmaclen, appcookielen;
|
|
@@ -1826,6 +1830,9 @@ EXT_RETURN tls_construct_stoc_cookie(SSL *s, WPACKET *pkt, unsigned int context,
|
|
|
EVP_MD_CTX_free(hctx);
|
|
|
EVP_PKEY_free(pkey);
|
|
|
return ret;
|
|
|
+#else
|
|
|
+ return EXT_RETURN_FAIL;
|
|
|
+#endif
|
|
|
}
|
|
|
|
|
|
EXT_RETURN tls_construct_stoc_cryptopro_bug(SSL *s, WPACKET *pkt,
|