Remove some node.js hacks.

These are no longer needed.

Change-Id: I909f7d690f57dafcdad6254948b5683757da69f4
Reviewed-on: https://boringssl-review.googlesource.com/13160
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: Adam Langley <agl@google.com>
diff --git a/include/openssl/ssl.h b/include/openssl/ssl.h
index 5a3205e..7c48b17 100644
--- a/include/openssl/ssl.h
+++ b/include/openssl/ssl.h
@@ -4070,9 +4070,7 @@
    * be negotiated and zero otherwise. */
   unsigned short_header_enabled:1;
 
-  /* extra_certs is a dummy value included for compatibility.
-   * TODO(agl): remove once node.js no longer references this. */
-  STACK_OF(X509)* extra_certs;
+  /* TODO(agl): remove once node.js no longer references this. */
   int freelist_max_len;
 };
 
@@ -4244,9 +4242,6 @@
    * session space. Only effective on the server side. */
   unsigned retain_only_sha256_of_client_certs:1;
 
-  /* TODO(agl): remove once node.js not longer references this. */
-  int tlsext_status_type;
-
   /* session_timeout is the default lifetime in seconds of the session
    * created in this connection. */
   long session_timeout;
diff --git a/ssl/t1_lib.c b/ssl/t1_lib.c
index 0681919..dc377c4 100644
--- a/ssl/t1_lib.c
+++ b/ssl/t1_lib.c
@@ -1136,10 +1136,6 @@
  *
  * https://tools.ietf.org/html/rfc6066#section-8 */
 
-static void ext_ocsp_init(SSL_HANDSHAKE *hs) {
-  hs->ssl->tlsext_status_type = -1;
-}
-
 static int ext_ocsp_add_clienthello(SSL_HANDSHAKE *hs, CBB *out) {
   SSL *const ssl = hs->ssl;
   if (!ssl->ocsp_stapling_enabled) {
@@ -1156,7 +1152,6 @@
     return 0;
   }
 
-  ssl->tlsext_status_type = TLSEXT_STATUSTYPE_ocsp;
   return 1;
 }
 
@@ -2633,7 +2628,7 @@
   },
   {
     TLSEXT_TYPE_status_request,
-    ext_ocsp_init,
+    NULL,
     ext_ocsp_add_clienthello,
     ext_ocsp_parse_serverhello,
     ext_ocsp_parse_clienthello,