@@ -3244,13 +3244,6 @@ void ssl3_free(SSL *s)
32443244 if (s == NULL )
32453245 return ;
32463246
3247- #ifdef TLSEXT_TYPE_opaque_prf_input
3248- if (s -> s3 -> client_opaque_prf_input != NULL )
3249- OPENSSL_free (s -> s3 -> client_opaque_prf_input );
3250- if (s -> s3 -> server_opaque_prf_input != NULL )
3251- OPENSSL_free (s -> s3 -> server_opaque_prf_input );
3252- #endif
3253-
32543247 ssl3_cleanup_key_block (s );
32553248 if (s -> s3 -> rbuf .buf != NULL )
32563249 ssl3_release_read_buffer (s );
@@ -3293,15 +3286,6 @@ void ssl3_clear(SSL *s)
32933286 size_t rlen , wlen ;
32943287 int init_extra ;
32953288
3296- #ifdef TLSEXT_TYPE_opaque_prf_input
3297- if (s -> s3 -> client_opaque_prf_input != NULL )
3298- OPENSSL_free (s -> s3 -> client_opaque_prf_input );
3299- s -> s3 -> client_opaque_prf_input = NULL ;
3300- if (s -> s3 -> server_opaque_prf_input != NULL )
3301- OPENSSL_free (s -> s3 -> server_opaque_prf_input );
3302- s -> s3 -> server_opaque_prf_input = NULL ;
3303- #endif
3304-
33053289 ssl3_cleanup_key_block (s );
33063290 if (s -> s3 -> tmp .ca_names != NULL )
33073291 sk_X509_NAME_pop_free (s -> s3 -> tmp .ca_names , X509_NAME_free );
@@ -3554,30 +3538,6 @@ long ssl3_ctrl(SSL *s, int cmd, long larg, void *parg)
35543538 ret = 1 ;
35553539 break ;
35563540
3557- # ifdef TLSEXT_TYPE_opaque_prf_input
3558- case SSL_CTRL_SET_TLSEXT_OPAQUE_PRF_INPUT :
3559- if (larg > 12288 ) { /* actual internal limit is 2^16 for the
3560- * complete hello message * (including the
3561- * cert chain and everything) */
3562- SSLerr (SSL_F_SSL3_CTRL , SSL_R_OPAQUE_PRF_INPUT_TOO_LONG );
3563- break ;
3564- }
3565- if (s -> tlsext_opaque_prf_input != NULL )
3566- OPENSSL_free (s -> tlsext_opaque_prf_input );
3567- if ((size_t )larg == 0 )
3568- s -> tlsext_opaque_prf_input = OPENSSL_malloc (1 ); /* dummy byte
3569- * just to get
3570- * non-NULL */
3571- else
3572- s -> tlsext_opaque_prf_input = BUF_memdup (parg , (size_t )larg );
3573- if (s -> tlsext_opaque_prf_input != NULL ) {
3574- s -> tlsext_opaque_prf_input_len = (size_t )larg ;
3575- ret = 1 ;
3576- } else
3577- s -> tlsext_opaque_prf_input_len = 0 ;
3578- break ;
3579- # endif
3580-
35813541 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE :
35823542 s -> tlsext_status_type = larg ;
35833543 ret = 1 ;
@@ -4071,12 +4031,6 @@ long ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg)
40714031 return 1 ;
40724032 }
40734033
4074- # ifdef TLSEXT_TYPE_opaque_prf_input
4075- case SSL_CTRL_SET_TLSEXT_OPAQUE_PRF_INPUT_CB_ARG :
4076- ctx -> tlsext_opaque_prf_input_callback_arg = parg ;
4077- return 1 ;
4078- # endif
4079-
40804034 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG :
40814035 ctx -> tlsext_status_arg = parg ;
40824036 return 1 ;
@@ -4241,13 +4195,6 @@ long ssl3_ctx_callback_ctrl(SSL_CTX *ctx, int cmd, void (*fp) (void))
42414195 ctx -> tlsext_servername_callback = (int (* )(SSL * , int * , void * ))fp ;
42424196 break ;
42434197
4244- # ifdef TLSEXT_TYPE_opaque_prf_input
4245- case SSL_CTRL_SET_TLSEXT_OPAQUE_PRF_INPUT_CB :
4246- ctx -> tlsext_opaque_prf_input_callback =
4247- (int (* )(SSL * , void * , size_t , void * ))fp ;
4248- break ;
4249- # endif
4250-
42514198 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB :
42524199 ctx -> tlsext_status_cb = (int (* )(SSL * , void * ))fp ;
42534200 break ;
0 commit comments