external/boringssl: Sync to 915c121bb5d424e09bf05c3aabf172a44e958e28.
This includes the following changes:
https://boringssl.googlesource.com/boringssl/+log/ea52ec98a56a40879b37493f3d1da1a1679e1fba..915c121bb5d424e09bf05c3aabf172a44e958e28
Test: BoringSSL CTS Presubmits
Change-Id: I3f5eba69372b484e19f4ca250c81f208aa5d3dc5
diff --git a/src/ssl/internal.h b/src/ssl/internal.h
index 4151d2b..78d7aa6 100644
--- a/src/ssl/internal.h
+++ b/src/ssl/internal.h
@@ -1010,6 +1010,7 @@
#define SSL_MAX_HANDSHAKE_FLIGHT 7
extern const uint8_t kHelloRetryRequest[SSL3_RANDOM_SIZE];
+extern const uint8_t kDraftDowngradeRandom[8];
// ssl_max_handshake_message_len returns the maximum number of bytes permitted
// in a handshake message for |ssl|.
@@ -2297,6 +2298,13 @@
// wpend_pending is true if we have a pending write outstanding.
bool wpend_pending:1;
+ // early_data_accepted is true if early data was accepted by the server.
+ bool early_data_accepted:1;
+
+ // draft_downgrade is whether the TLS 1.3 anti-downgrade logic would have
+ // fired, were it not a draft.
+ bool draft_downgrade:1;
+
uint8_t send_alert[2] = {0};
// hs_buf is the buffer of handshake data to process.
@@ -2643,9 +2651,6 @@
// hash of the peer's certificate and then discard it to save memory and
// session space. Only effective on the server side.
bool retain_only_sha256_of_client_certs:1;
-
- // early_data_accepted is true if early data was accepted by the server.
- bool early_data_accepted:1;
};
// From draft-ietf-tls-tls13-18, used in determining PSK modes.