diff options
| author | jsing <> | 2019-03-25 17:33:26 +0000 |
|---|---|---|
| committer | jsing <> | 2019-03-25 17:33:26 +0000 |
| commit | 97b045dbcc34049cb190d3b235aaed0155c5e995 (patch) | |
| tree | 24293956674de119dfead3f60d3bf76b67c7b924 | |
| parent | 6c6b3a7290be9680e2f358b43c5498cf1537dac7 (diff) | |
| download | openbsd-97b045dbcc34049cb190d3b235aaed0155c5e995.tar.gz openbsd-97b045dbcc34049cb190d3b235aaed0155c5e995.tar.bz2 openbsd-97b045dbcc34049cb190d3b235aaed0155c5e995.zip | |
Strip out all of the pkey to sigalg and sigalg to pkey linkages.
These are no longer used now that we defer signature algorithm selection.
ok beck@
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libssl/ssl_cert.c | 24 | ||||
| -rw-r--r-- | src/lib/libssl/ssl_lib.c | 14 | ||||
| -rw-r--r-- | src/lib/libssl/ssl_locl.h | 4 | ||||
| -rw-r--r-- | src/lib/libssl/ssl_sigalgs.c | 22 | ||||
| -rw-r--r-- | src/lib/libssl/ssl_sigalgs.h | 3 |
5 files changed, 8 insertions, 59 deletions
diff --git a/src/lib/libssl/ssl_cert.c b/src/lib/libssl/ssl_cert.c index ab76939116..6c00b0d336 100644 --- a/src/lib/libssl/ssl_cert.c +++ b/src/lib/libssl/ssl_cert.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_cert.c,v 1.73 2019/03/25 16:24:57 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_cert.c,v 1.74 2019/03/25 17:33:26 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -158,22 +158,6 @@ SSL_get_ex_data_X509_STORE_CTX_idx(void) | |||
| 158 | return ssl_x509_store_ctx_idx; | 158 | return ssl_x509_store_ctx_idx; |
| 159 | } | 159 | } |
| 160 | 160 | ||
| 161 | static void | ||
| 162 | ssl_cert_set_default_sigalgs(CERT *cert) | ||
| 163 | { | ||
| 164 | /* Set digest values to defaults */ | ||
| 165 | cert->pkeys[SSL_PKEY_RSA_SIGN].sigalg = | ||
| 166 | ssl_sigalg_lookup(SIGALG_RSA_PKCS1_SHA1); | ||
| 167 | cert->pkeys[SSL_PKEY_RSA_ENC].sigalg = | ||
| 168 | ssl_sigalg_lookup(SIGALG_RSA_PKCS1_SHA1); | ||
| 169 | cert->pkeys[SSL_PKEY_ECC].sigalg = | ||
| 170 | ssl_sigalg_lookup(SIGALG_ECDSA_SHA1); | ||
| 171 | #ifndef OPENSSL_NO_GOST | ||
| 172 | cert->pkeys[SSL_PKEY_GOST01].sigalg = | ||
| 173 | ssl_sigalg_lookup(SIGALG_GOSTR01_GOST94); | ||
| 174 | #endif | ||
| 175 | } | ||
| 176 | |||
| 177 | CERT * | 161 | CERT * |
| 178 | ssl_cert_new(void) | 162 | ssl_cert_new(void) |
| 179 | { | 163 | { |
| @@ -186,7 +170,6 @@ ssl_cert_new(void) | |||
| 186 | } | 170 | } |
| 187 | ret->key = &(ret->pkeys[SSL_PKEY_RSA_ENC]); | 171 | ret->key = &(ret->pkeys[SSL_PKEY_RSA_ENC]); |
| 188 | ret->references = 1; | 172 | ret->references = 1; |
| 189 | ssl_cert_set_default_sigalgs(ret); | ||
| 190 | return (ret); | 173 | return (ret); |
| 191 | } | 174 | } |
| 192 | 175 | ||
| @@ -289,11 +272,6 @@ ssl_cert_dup(CERT *cert) | |||
| 289 | */ | 272 | */ |
| 290 | 273 | ||
| 291 | ret->references = 1; | 274 | ret->references = 1; |
| 292 | /* | ||
| 293 | * Set sigalgs to defaults. NB: we don't copy existing values | ||
| 294 | * as they will be set during handshake. | ||
| 295 | */ | ||
| 296 | ssl_cert_set_default_sigalgs(ret); | ||
| 297 | 275 | ||
| 298 | return (ret); | 276 | return (ret); |
| 299 | 277 | ||
diff --git a/src/lib/libssl/ssl_lib.c b/src/lib/libssl/ssl_lib.c index 70a4c6d16f..adcaa1b3cc 100644 --- a/src/lib/libssl/ssl_lib.c +++ b/src/lib/libssl/ssl_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_lib.c,v 1.203 2019/03/25 17:21:18 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_lib.c,v 1.204 2019/03/25 17:33:26 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -2734,20 +2734,14 @@ SSL_get_SSL_CTX(const SSL *ssl) | |||
| 2734 | SSL_CTX * | 2734 | SSL_CTX * |
| 2735 | SSL_set_SSL_CTX(SSL *ssl, SSL_CTX* ctx) | 2735 | SSL_set_SSL_CTX(SSL *ssl, SSL_CTX* ctx) |
| 2736 | { | 2736 | { |
| 2737 | CERT *ocert = ssl->cert; | ||
| 2738 | |||
| 2739 | if (ssl->ctx == ctx) | 2737 | if (ssl->ctx == ctx) |
| 2740 | return (ssl->ctx); | 2738 | return (ssl->ctx); |
| 2741 | if (ctx == NULL) | 2739 | if (ctx == NULL) |
| 2742 | ctx = ssl->initial_ctx; | 2740 | ctx = ssl->initial_ctx; |
| 2741 | |||
| 2742 | ssl_cert_free(ssl->cert); | ||
| 2743 | ssl->cert = ssl_cert_dup(ctx->internal->cert); | 2743 | ssl->cert = ssl_cert_dup(ctx->internal->cert); |
| 2744 | if (ocert != NULL) { | 2744 | |
| 2745 | int i; | ||
| 2746 | /* Copy negotiated sigalg from original certificate. */ | ||
| 2747 | for (i = 0; i < SSL_PKEY_NUM; i++) | ||
| 2748 | ssl->cert->pkeys[i].sigalg = ocert->pkeys[i].sigalg; | ||
| 2749 | ssl_cert_free(ocert); | ||
| 2750 | } | ||
| 2751 | CRYPTO_add(&ctx->references, 1, CRYPTO_LOCK_SSL_CTX); | 2745 | CRYPTO_add(&ctx->references, 1, CRYPTO_LOCK_SSL_CTX); |
| 2752 | SSL_CTX_free(ssl->ctx); /* decrement reference count */ | 2746 | SSL_CTX_free(ssl->ctx); /* decrement reference count */ |
| 2753 | ssl->ctx = ctx; | 2747 | ssl->ctx = ctx; |
diff --git a/src/lib/libssl/ssl_locl.h b/src/lib/libssl/ssl_locl.h index 5358de452b..2dae72309c 100644 --- a/src/lib/libssl/ssl_locl.h +++ b/src/lib/libssl/ssl_locl.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_locl.h,v 1.243 2019/03/25 17:27:31 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_locl.h,v 1.244 2019/03/25 17:33:26 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -966,8 +966,6 @@ typedef struct cert_pkey_st { | |||
| 966 | X509 *x509; | 966 | X509 *x509; |
| 967 | EVP_PKEY *privatekey; | 967 | EVP_PKEY *privatekey; |
| 968 | STACK_OF(X509) *chain; | 968 | STACK_OF(X509) *chain; |
| 969 | /* sigalg to use when signing */ | ||
| 970 | const struct ssl_sigalg *sigalg; | ||
| 971 | } CERT_PKEY; | 969 | } CERT_PKEY; |
| 972 | 970 | ||
| 973 | typedef struct cert_st { | 971 | typedef struct cert_st { |
diff --git a/src/lib/libssl/ssl_sigalgs.c b/src/lib/libssl/ssl_sigalgs.c index 50f4802fdb..129ccccfbc 100644 --- a/src/lib/libssl/ssl_sigalgs.c +++ b/src/lib/libssl/ssl_sigalgs.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_sigalgs.c,v 1.18 2019/03/25 17:21:18 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_sigalgs.c,v 1.19 2019/03/25 17:33:26 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2018-2019 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2018-2019 Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
| @@ -29,13 +29,11 @@ const struct ssl_sigalg sigalgs[] = { | |||
| 29 | .value = SIGALG_RSA_PKCS1_SHA512, | 29 | .value = SIGALG_RSA_PKCS1_SHA512, |
| 30 | .md = EVP_sha512, | 30 | .md = EVP_sha512, |
| 31 | .key_type = EVP_PKEY_RSA, | 31 | .key_type = EVP_PKEY_RSA, |
| 32 | .pkey_idx = SSL_PKEY_RSA_SIGN, | ||
| 33 | }, | 32 | }, |
| 34 | { | 33 | { |
| 35 | .value = SIGALG_ECDSA_SECP521R1_SHA512, | 34 | .value = SIGALG_ECDSA_SECP521R1_SHA512, |
| 36 | .md = EVP_sha512, | 35 | .md = EVP_sha512, |
| 37 | .key_type = EVP_PKEY_EC, | 36 | .key_type = EVP_PKEY_EC, |
| 38 | .pkey_idx = SSL_PKEY_ECC, | ||
| 39 | .curve_nid = NID_secp521r1, | 37 | .curve_nid = NID_secp521r1, |
| 40 | }, | 38 | }, |
| 41 | #ifndef OPENSSL_NO_GOST | 39 | #ifndef OPENSSL_NO_GOST |
| @@ -43,33 +41,28 @@ const struct ssl_sigalg sigalgs[] = { | |||
| 43 | .value = SIGALG_GOSTR12_512_STREEBOG_512, | 41 | .value = SIGALG_GOSTR12_512_STREEBOG_512, |
| 44 | .md = EVP_streebog512, | 42 | .md = EVP_streebog512, |
| 45 | .key_type = EVP_PKEY_GOSTR12_512, | 43 | .key_type = EVP_PKEY_GOSTR12_512, |
| 46 | .pkey_idx = SSL_PKEY_GOST01, /* XXX */ | ||
| 47 | }, | 44 | }, |
| 48 | #endif | 45 | #endif |
| 49 | { | 46 | { |
| 50 | .value = SIGALG_RSA_PKCS1_SHA384, | 47 | .value = SIGALG_RSA_PKCS1_SHA384, |
| 51 | .md = EVP_sha384, | 48 | .md = EVP_sha384, |
| 52 | .key_type = EVP_PKEY_RSA, | 49 | .key_type = EVP_PKEY_RSA, |
| 53 | .pkey_idx = SSL_PKEY_RSA_SIGN, | ||
| 54 | }, | 50 | }, |
| 55 | { | 51 | { |
| 56 | .value = SIGALG_ECDSA_SECP384R1_SHA384, | 52 | .value = SIGALG_ECDSA_SECP384R1_SHA384, |
| 57 | .md = EVP_sha384, | 53 | .md = EVP_sha384, |
| 58 | .key_type = EVP_PKEY_EC, | 54 | .key_type = EVP_PKEY_EC, |
| 59 | .pkey_idx = SSL_PKEY_ECC, | ||
| 60 | .curve_nid = NID_secp384r1, | 55 | .curve_nid = NID_secp384r1, |
| 61 | }, | 56 | }, |
| 62 | { | 57 | { |
| 63 | .value = SIGALG_RSA_PKCS1_SHA256, | 58 | .value = SIGALG_RSA_PKCS1_SHA256, |
| 64 | .md = EVP_sha256, | 59 | .md = EVP_sha256, |
| 65 | .key_type = EVP_PKEY_RSA, | 60 | .key_type = EVP_PKEY_RSA, |
| 66 | .pkey_idx = SSL_PKEY_RSA_SIGN, | ||
| 67 | }, | 61 | }, |
| 68 | { | 62 | { |
| 69 | .value = SIGALG_ECDSA_SECP256R1_SHA256, | 63 | .value = SIGALG_ECDSA_SECP256R1_SHA256, |
| 70 | .md = EVP_sha256, | 64 | .md = EVP_sha256, |
| 71 | .key_type = EVP_PKEY_EC, | 65 | .key_type = EVP_PKEY_EC, |
| 72 | .pkey_idx = SSL_PKEY_ECC, | ||
| 73 | .curve_nid = NID_X9_62_prime256v1, | 66 | .curve_nid = NID_X9_62_prime256v1, |
| 74 | }, | 67 | }, |
| 75 | #ifndef OPENSSL_NO_GOST | 68 | #ifndef OPENSSL_NO_GOST |
| @@ -77,85 +70,72 @@ const struct ssl_sigalg sigalgs[] = { | |||
| 77 | .value = SIGALG_GOSTR12_256_STREEBOG_256, | 70 | .value = SIGALG_GOSTR12_256_STREEBOG_256, |
| 78 | .md = EVP_streebog256, | 71 | .md = EVP_streebog256, |
| 79 | .key_type = EVP_PKEY_GOSTR12_256, | 72 | .key_type = EVP_PKEY_GOSTR12_256, |
| 80 | .pkey_idx = SSL_PKEY_GOST01, /* XXX */ | ||
| 81 | }, | 73 | }, |
| 82 | { | 74 | { |
| 83 | .value = SIGALG_GOSTR01_GOST94, | 75 | .value = SIGALG_GOSTR01_GOST94, |
| 84 | .md = EVP_gostr341194, | 76 | .md = EVP_gostr341194, |
| 85 | .key_type = EVP_PKEY_GOSTR01, | 77 | .key_type = EVP_PKEY_GOSTR01, |
| 86 | .pkey_idx = SSL_PKEY_GOST01, | ||
| 87 | }, | 78 | }, |
| 88 | #endif | 79 | #endif |
| 89 | { | 80 | { |
| 90 | .value = SIGALG_RSA_PSS_RSAE_SHA256, | 81 | .value = SIGALG_RSA_PSS_RSAE_SHA256, |
| 91 | .md = EVP_sha256, | 82 | .md = EVP_sha256, |
| 92 | .key_type = EVP_PKEY_RSA, | 83 | .key_type = EVP_PKEY_RSA, |
| 93 | .pkey_idx = SSL_PKEY_RSA_SIGN, | ||
| 94 | .flags = SIGALG_FLAG_RSA_PSS, | 84 | .flags = SIGALG_FLAG_RSA_PSS, |
| 95 | }, | 85 | }, |
| 96 | { | 86 | { |
| 97 | .value = SIGALG_RSA_PSS_RSAE_SHA384, | 87 | .value = SIGALG_RSA_PSS_RSAE_SHA384, |
| 98 | .md = EVP_sha384, | 88 | .md = EVP_sha384, |
| 99 | .key_type = EVP_PKEY_RSA, | 89 | .key_type = EVP_PKEY_RSA, |
| 100 | .pkey_idx = SSL_PKEY_RSA_SIGN, | ||
| 101 | .flags = SIGALG_FLAG_RSA_PSS, | 90 | .flags = SIGALG_FLAG_RSA_PSS, |
| 102 | }, | 91 | }, |
| 103 | { | 92 | { |
| 104 | .value = SIGALG_RSA_PSS_RSAE_SHA512, | 93 | .value = SIGALG_RSA_PSS_RSAE_SHA512, |
| 105 | .md = EVP_sha512, | 94 | .md = EVP_sha512, |
| 106 | .key_type = EVP_PKEY_RSA, | 95 | .key_type = EVP_PKEY_RSA, |
| 107 | .pkey_idx = SSL_PKEY_RSA_SIGN, | ||
| 108 | .flags = SIGALG_FLAG_RSA_PSS, | 96 | .flags = SIGALG_FLAG_RSA_PSS, |
| 109 | }, | 97 | }, |
| 110 | { | 98 | { |
| 111 | .value = SIGALG_RSA_PSS_PSS_SHA256, | 99 | .value = SIGALG_RSA_PSS_PSS_SHA256, |
| 112 | .md = EVP_sha256, | 100 | .md = EVP_sha256, |
| 113 | .key_type = EVP_PKEY_RSA, | 101 | .key_type = EVP_PKEY_RSA, |
| 114 | .pkey_idx = SSL_PKEY_RSA_SIGN, | ||
| 115 | .flags = SIGALG_FLAG_RSA_PSS, | 102 | .flags = SIGALG_FLAG_RSA_PSS, |
| 116 | }, | 103 | }, |
| 117 | { | 104 | { |
| 118 | .value = SIGALG_RSA_PSS_PSS_SHA384, | 105 | .value = SIGALG_RSA_PSS_PSS_SHA384, |
| 119 | .md = EVP_sha384, | 106 | .md = EVP_sha384, |
| 120 | .key_type = EVP_PKEY_RSA, | 107 | .key_type = EVP_PKEY_RSA, |
| 121 | .pkey_idx = SSL_PKEY_RSA_SIGN, | ||
| 122 | .flags = SIGALG_FLAG_RSA_PSS, | 108 | .flags = SIGALG_FLAG_RSA_PSS, |
| 123 | }, | 109 | }, |
| 124 | { | 110 | { |
| 125 | .value = SIGALG_RSA_PSS_PSS_SHA512, | 111 | .value = SIGALG_RSA_PSS_PSS_SHA512, |
| 126 | .md = EVP_sha512, | 112 | .md = EVP_sha512, |
| 127 | .key_type = EVP_PKEY_RSA, | 113 | .key_type = EVP_PKEY_RSA, |
| 128 | .pkey_idx = SSL_PKEY_RSA_SIGN, | ||
| 129 | .flags = SIGALG_FLAG_RSA_PSS, | 114 | .flags = SIGALG_FLAG_RSA_PSS, |
| 130 | }, | 115 | }, |
| 131 | { | 116 | { |
| 132 | .value = SIGALG_RSA_PKCS1_SHA224, | 117 | .value = SIGALG_RSA_PKCS1_SHA224, |
| 133 | .md = EVP_sha224, | 118 | .md = EVP_sha224, |
| 134 | .key_type = EVP_PKEY_RSA, | 119 | .key_type = EVP_PKEY_RSA, |
| 135 | .pkey_idx = SSL_PKEY_RSA_SIGN, | ||
| 136 | }, | 120 | }, |
| 137 | { | 121 | { |
| 138 | .value = SIGALG_ECDSA_SECP224R1_SHA224, | 122 | .value = SIGALG_ECDSA_SECP224R1_SHA224, |
| 139 | .md = EVP_sha224, | 123 | .md = EVP_sha224, |
| 140 | .key_type = EVP_PKEY_EC, | 124 | .key_type = EVP_PKEY_EC, |
| 141 | .pkey_idx = SSL_PKEY_ECC, | ||
| 142 | }, | 125 | }, |
| 143 | { | 126 | { |
| 144 | .value = SIGALG_RSA_PKCS1_SHA1, | 127 | .value = SIGALG_RSA_PKCS1_SHA1, |
| 145 | .key_type = EVP_PKEY_RSA, | 128 | .key_type = EVP_PKEY_RSA, |
| 146 | .pkey_idx = SSL_PKEY_RSA_SIGN, | ||
| 147 | .md = EVP_sha1, | 129 | .md = EVP_sha1, |
| 148 | }, | 130 | }, |
| 149 | { | 131 | { |
| 150 | .value = SIGALG_ECDSA_SHA1, | 132 | .value = SIGALG_ECDSA_SHA1, |
| 151 | .key_type = EVP_PKEY_EC, | 133 | .key_type = EVP_PKEY_EC, |
| 152 | .md = EVP_sha1, | 134 | .md = EVP_sha1, |
| 153 | .pkey_idx = SSL_PKEY_ECC, | ||
| 154 | }, | 135 | }, |
| 155 | { | 136 | { |
| 156 | .value = SIGALG_RSA_PKCS1_MD5_SHA1, | 137 | .value = SIGALG_RSA_PKCS1_MD5_SHA1, |
| 157 | .key_type = EVP_PKEY_RSA, | 138 | .key_type = EVP_PKEY_RSA, |
| 158 | .pkey_idx = SSL_PKEY_RSA_SIGN, | ||
| 159 | .md = EVP_md5_sha1, | 139 | .md = EVP_md5_sha1, |
| 160 | }, | 140 | }, |
| 161 | { | 141 | { |
diff --git a/src/lib/libssl/ssl_sigalgs.h b/src/lib/libssl/ssl_sigalgs.h index d06731e10d..13a3597fb5 100644 --- a/src/lib/libssl/ssl_sigalgs.h +++ b/src/lib/libssl/ssl_sigalgs.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_sigalgs.h,v 1.13 2019/03/25 17:21:18 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_sigalgs.h,v 1.14 2019/03/25 17:33:26 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2018-2019 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2018-2019 Bob Beck <beck@openbsd.org> |
| 4 | * | 4 | * |
| @@ -64,7 +64,6 @@ struct ssl_sigalg{ | |||
| 64 | uint16_t value; | 64 | uint16_t value; |
| 65 | const EVP_MD *(*md)(void); | 65 | const EVP_MD *(*md)(void); |
| 66 | int key_type; | 66 | int key_type; |
| 67 | int pkey_idx; /* XXX get rid of this eventually */ | ||
| 68 | int curve_nid; | 67 | int curve_nid; |
| 69 | int flags; | 68 | int flags; |
| 70 | }; | 69 | }; |
