diff --git a/docs/libcurl/opts/CURLOPT_SSL_OPTIONS.md b/docs/libcurl/opts/CURLOPT_SSL_OPTIONS.md index 93126773bc..a9c190902f 100644 --- a/docs/libcurl/opts/CURLOPT_SSL_OPTIONS.md +++ b/docs/libcurl/opts/CURLOPT_SSL_OPTIONS.md @@ -90,7 +90,7 @@ could be a privacy violation and unexpected. Tell libcurl to try sending application data as TLS1.3 early data. This option is supported for GnuTLS, wolfSSL, quictls and OpenSSL (but not BoringSSL -or AWSLC). It works on TCP and QUIC connections using ngtcp2. +or AWS-LC). It works on TCP and QUIC connections using ngtcp2. This option works on a best effort basis, in cases when it wasn't possible to send early data the request is resent normally post-handshake. diff --git a/lib/vtls/openssl.c b/lib/vtls/openssl.c index 70e8cd66d7..b836caf00e 100644 --- a/lib/vtls/openssl.c +++ b/lib/vtls/openssl.c @@ -4863,6 +4863,7 @@ static CURLcode ossl_connect_step3(struct Curl_cfilter *cf, return result; } +#ifdef HAVE_OPENSSL_EARLYDATA static CURLcode ossl_send_earlydata(struct Curl_cfilter *cf, struct Curl_easy *data) { @@ -4940,6 +4941,7 @@ static CURLcode ossl_send_earlydata(struct Curl_cfilter *cf, out: return result; } +#endif /* HAVE_OPENSSL_EARLYDATA */ static CURLcode ossl_connect(struct Curl_cfilter *cf, struct Curl_easy *data, @@ -4967,6 +4969,7 @@ static CURLcode ossl_connect(struct Curl_cfilter *cf, if(ssl_connect_2 == connssl->connecting_state) { CURL_TRC_CF(data, cf, "ossl_connect, step2"); +#ifdef HAVE_OPENSSL_EARLYDATA if(connssl->earlydata_state == ssl_earlydata_await) { goto out; } @@ -4976,6 +4979,7 @@ static CURLcode ossl_connect(struct Curl_cfilter *cf, goto out; connssl->earlydata_state = ssl_earlydata_sent; } +#endif DEBUGASSERT((connssl->earlydata_state == ssl_earlydata_none) || (connssl->earlydata_state == ssl_earlydata_sent));