summaryrefslogtreecommitdiff
path: root/lib/includes
diff options
context:
space:
mode:
authorpeonix <ajeetsinghchahar2@gmail.com>2023-03-28 09:08:40 +0530
committerpeonix <ajeetsinghchahar2@gmail.com>2023-03-28 09:08:40 +0530
commita7c4a04ed62be828b8aba170329c083bff3d6d34 (patch)
tree9e89d641d9e7c6519355a673f1e194712b162a47 /lib/includes
parent195be04e144b95d084eef3c4aa72b65c01fcb7c8 (diff)
downloadgnutls-a7c4a04ed62be828b8aba170329c083bff3d6d34.tar.gz
Modifier GNUTLS_NO_EXTENSIONS renamed to GNUTLS_NO_DEFAULT_EXTENSIONS
Signed-off-by: peonix <ajeetsinghchahar2@gmail.com>
Diffstat (limited to 'lib/includes')
-rw-r--r--lib/includes/gnutls/gnutls.h.in6
1 files changed, 3 insertions, 3 deletions
diff --git a/lib/includes/gnutls/gnutls.h.in b/lib/includes/gnutls/gnutls.h.in
index c3ff442cb7..64098c5b36 100644
--- a/lib/includes/gnutls/gnutls.h.in
+++ b/lib/includes/gnutls/gnutls.h.in
@@ -438,7 +438,7 @@ typedef enum {
* @GNUTLS_DATAGRAM: Connection is datagram oriented (DTLS). Since 3.0.0.
* @GNUTLS_NONBLOCK: Connection should not block. Since 3.0.0.
* @GNUTLS_NO_SIGNAL: In systems where SIGPIPE is delivered on send, it will be disabled. That flag has effect in systems which support the MSG_NOSIGNAL sockets flag (since 3.4.2).
- * @GNUTLS_NO_EXTENSIONS: Do not enable any TLS extensions by default (since 3.1.2). As TLS 1.2 and later require extensions this option is considered obsolete and should not be used.
+ * @GNUTLS_NO_DEFAULT_EXTENSIONS: Do not enable any TLS extensions by default (since 3.1.2). As TLS 1.2 and later require extensions this option is considered obsolete and should not be used.
* @GNUTLS_NO_REPLAY_PROTECTION: Disable any replay protection in DTLS. This must only be used if replay protection is achieved using other means. Since 3.2.2.
* @GNUTLS_ALLOW_ID_CHANGE: Allow the peer to replace its certificate, or change its ID during a rehandshake. This change is often used in attacks and thus prohibited by default. Since 3.5.0.
* @GNUTLS_ENABLE_FALSE_START: Enable the TLS false start on client side if the negotiated ciphersuites allow it. This will enable sending data prior to the handshake being complete, and may introduce a risk of crypto failure when combined with certain key exchanged; for that GnuTLS may not enable that option in ciphersuites that are known to be not safe for false start. Since 3.5.0.
@@ -499,7 +499,7 @@ typedef enum {
GNUTLS_CLIENT = (1 << 1),
GNUTLS_DATAGRAM = (1 << 2),
GNUTLS_NONBLOCK = (1 << 3),
- GNUTLS_NO_EXTENSIONS = (1 << 4),
+ GNUTLS_NO_DEFAULT_EXTENSIONS = (1 << 4),
GNUTLS_NO_REPLAY_PROTECTION = (1 << 5),
GNUTLS_NO_SIGNAL = (1 << 6),
GNUTLS_ALLOW_ID_CHANGE = (1 << 7),
@@ -528,7 +528,7 @@ typedef enum {
# define GNUTLS_CLIENT (1<<1)
# define GNUTLS_DATAGRAM (1<<2)
# define GNUTLS_NONBLOCK (1<<3)
-# define GNUTLS_NO_EXTENSIONS (1<<4)
+# define GNUTLS_NO_DEFAULT_EXTENSIONS (1<<4)
# define GNUTLS_NO_REPLAY_PROTECTION (1<<5)
# define GNUTLS_NO_SIGNAL (1<<6)
# define GNUTLS_ALLOW_ID_CHANGE (1<<7)