diff options
author | peonix <ajeetsinghchahar2@gmail.com> | 2023-03-28 09:08:40 +0530 |
---|---|---|
committer | peonix <ajeetsinghchahar2@gmail.com> | 2023-03-28 09:08:40 +0530 |
commit | a7c4a04ed62be828b8aba170329c083bff3d6d34 (patch) | |
tree | 9e89d641d9e7c6519355a673f1e194712b162a47 /lib/includes | |
parent | 195be04e144b95d084eef3c4aa72b65c01fcb7c8 (diff) | |
download | gnutls-a7c4a04ed62be828b8aba170329c083bff3d6d34.tar.gz |
Modifier GNUTLS_NO_EXTENSIONS renamed to GNUTLS_NO_DEFAULT_EXTENSIONS
Signed-off-by: peonix <ajeetsinghchahar2@gmail.com>
Diffstat (limited to 'lib/includes')
-rw-r--r-- | lib/includes/gnutls/gnutls.h.in | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/lib/includes/gnutls/gnutls.h.in b/lib/includes/gnutls/gnutls.h.in index c3ff442cb7..64098c5b36 100644 --- a/lib/includes/gnutls/gnutls.h.in +++ b/lib/includes/gnutls/gnutls.h.in @@ -438,7 +438,7 @@ typedef enum { * @GNUTLS_DATAGRAM: Connection is datagram oriented (DTLS). Since 3.0.0. * @GNUTLS_NONBLOCK: Connection should not block. Since 3.0.0. * @GNUTLS_NO_SIGNAL: In systems where SIGPIPE is delivered on send, it will be disabled. That flag has effect in systems which support the MSG_NOSIGNAL sockets flag (since 3.4.2). - * @GNUTLS_NO_EXTENSIONS: Do not enable any TLS extensions by default (since 3.1.2). As TLS 1.2 and later require extensions this option is considered obsolete and should not be used. + * @GNUTLS_NO_DEFAULT_EXTENSIONS: Do not enable any TLS extensions by default (since 3.1.2). As TLS 1.2 and later require extensions this option is considered obsolete and should not be used. * @GNUTLS_NO_REPLAY_PROTECTION: Disable any replay protection in DTLS. This must only be used if replay protection is achieved using other means. Since 3.2.2. * @GNUTLS_ALLOW_ID_CHANGE: Allow the peer to replace its certificate, or change its ID during a rehandshake. This change is often used in attacks and thus prohibited by default. Since 3.5.0. * @GNUTLS_ENABLE_FALSE_START: Enable the TLS false start on client side if the negotiated ciphersuites allow it. This will enable sending data prior to the handshake being complete, and may introduce a risk of crypto failure when combined with certain key exchanged; for that GnuTLS may not enable that option in ciphersuites that are known to be not safe for false start. Since 3.5.0. @@ -499,7 +499,7 @@ typedef enum { GNUTLS_CLIENT = (1 << 1), GNUTLS_DATAGRAM = (1 << 2), GNUTLS_NONBLOCK = (1 << 3), - GNUTLS_NO_EXTENSIONS = (1 << 4), + GNUTLS_NO_DEFAULT_EXTENSIONS = (1 << 4), GNUTLS_NO_REPLAY_PROTECTION = (1 << 5), GNUTLS_NO_SIGNAL = (1 << 6), GNUTLS_ALLOW_ID_CHANGE = (1 << 7), @@ -528,7 +528,7 @@ typedef enum { # define GNUTLS_CLIENT (1<<1) # define GNUTLS_DATAGRAM (1<<2) # define GNUTLS_NONBLOCK (1<<3) -# define GNUTLS_NO_EXTENSIONS (1<<4) +# define GNUTLS_NO_DEFAULT_EXTENSIONS (1<<4) # define GNUTLS_NO_REPLAY_PROTECTION (1<<5) # define GNUTLS_NO_SIGNAL (1<<6) # define GNUTLS_ALLOW_ID_CHANGE (1<<7) |