return result;
}
-#ifndef HAVE_BORINGSSL
+#if !defined(HAVE_BORINGSSL) && !defined(OPENSSL_NO_TLSEXT)
static CURLcode verifystatus(struct connectdata *conn,
struct ssl_connect_data *connssl)
{
return CURLE_OUT_OF_MEMORY;
}
-#ifndef HAVE_BORINGSSL
+#if !defined(HAVE_BORINGSSL) && !defined(OPENSSL_NO_TLSEXT)
if(data->set.ssl.verifystatus)
SSL_set_tlsext_status_type(connssl->handle, TLSEXT_STATUSTYPE_ocsp);
#endif
infof(data, "\t SSL certificate verify ok.\n");
}
-#ifndef HAVE_BORINGSSL
+#if !defined(HAVE_BORINGSSL) && !defined(OPENSSL_NO_TLSEXT)
if(data->set.ssl.verifystatus) {
result = verifystatus(conn, connssl);
if(result) {