summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authortedu <>2014-05-06 01:54:42 +0000
committertedu <>2014-05-06 01:54:42 +0000
commit8a43c92669732fa7f1d4b0cbdc82123b7c8a15fb (patch)
tree8080a565036e90695e3de5a9b2ce3ca1c36c1efc
parent1114d41f2e8954f3f2e2d40236682a9cc7d1fdbf (diff)
downloadopenbsd-8a43c92669732fa7f1d4b0cbdc82123b7c8a15fb.tar.gz
openbsd-8a43c92669732fa7f1d4b0cbdc82123b7c8a15fb.tar.bz2
openbsd-8a43c92669732fa7f1d4b0cbdc82123b7c8a15fb.zip
remove Kerberos
-rw-r--r--src/lib/libssl/src/apps/s_client.c9
-rw-r--r--src/lib/libssl/src/apps/s_server.c32
2 files changed, 0 insertions, 41 deletions
diff --git a/src/lib/libssl/src/apps/s_client.c b/src/lib/libssl/src/apps/s_client.c
index e409589eb4..3dc613ebc2 100644
--- a/src/lib/libssl/src/apps/s_client.c
+++ b/src/lib/libssl/src/apps/s_client.c
@@ -418,9 +418,6 @@ s_client_main(int argc, char **argv)
418{ 418{
419 unsigned int off = 0, clr = 0; 419 unsigned int off = 0, clr = 0;
420 SSL *con = NULL; 420 SSL *con = NULL;
421#ifndef OPENSSL_NO_KRB5
422 KSSL_CTX *kctx;
423#endif
424 int s, k, width, state = 0, af = AF_UNSPEC; 421 int s, k, width, state = 0, af = AF_UNSPEC;
425 char *cbuf = NULL, *sbuf = NULL, *mbuf = NULL; 422 char *cbuf = NULL, *sbuf = NULL, *mbuf = NULL;
426 int cbuf_len, cbuf_off; 423 int cbuf_len, cbuf_off;
@@ -963,12 +960,6 @@ bad:
963 } 960 }
964 } 961 }
965#endif 962#endif
966#ifndef OPENSSL_NO_KRB5
967 if (con && (kctx = kssl_ctx_new()) != NULL) {
968 SSL_set0_kssl_ctx(con, kctx);
969 kssl_ctx_setstring(kctx, KSSL_SERVER, host);
970 }
971#endif /* OPENSSL_NO_KRB5 */
972/* SSL_set_cipher_list(con,"RC4-MD5"); */ 963/* SSL_set_cipher_list(con,"RC4-MD5"); */
973#if 0 964#if 0
974#ifdef TLSEXT_TYPE_opaque_prf_input 965#ifdef TLSEXT_TYPE_opaque_prf_input
diff --git a/src/lib/libssl/src/apps/s_server.c b/src/lib/libssl/src/apps/s_server.c
index 22e3c18ada..c34816749a 100644
--- a/src/lib/libssl/src/apps/s_server.c
+++ b/src/lib/libssl/src/apps/s_server.c
@@ -1557,9 +1557,6 @@ sv_body(char *hostname, int s, unsigned char *context)
1557 unsigned long l; 1557 unsigned long l;
1558 SSL *con = NULL; 1558 SSL *con = NULL;
1559 BIO *sbio; 1559 BIO *sbio;
1560#ifndef OPENSSL_NO_KRB5
1561 KSSL_CTX *kctx;
1562#endif
1563 struct timeval timeout; 1560 struct timeval timeout;
1564 struct timeval *timeoutp; 1561 struct timeval *timeoutp;
1565 1562
@@ -1589,13 +1586,6 @@ sv_body(char *hostname, int s, unsigned char *context)
1589 SSL_CTX_set_tlsext_status_arg(ctx, &tlscstatp); 1586 SSL_CTX_set_tlsext_status_arg(ctx, &tlscstatp);
1590 } 1587 }
1591#endif 1588#endif
1592#ifndef OPENSSL_NO_KRB5
1593 if ((kctx = kssl_ctx_new()) != NULL) {
1594 SSL_set0_kssl_ctx(con, kctx);
1595 kssl_ctx_setstring(kctx, KSSL_SERVICE, KRB5SVC);
1596 kssl_ctx_setstring(kctx, KSSL_KEYTAB, KRB5KEYTAB);
1597 }
1598#endif /* OPENSSL_NO_KRB5 */
1599 if (context) 1589 if (context)
1600 SSL_set_session_id_context(con, context, 1590 SSL_set_session_id_context(con, context,
1601 strlen((char *) context)); 1591 strlen((char *) context));
@@ -1885,9 +1875,6 @@ init_ssl_connection(SSL * con)
1885 X509 *peer; 1875 X509 *peer;
1886 long verify_error; 1876 long verify_error;
1887 char buf[BUFSIZ]; 1877 char buf[BUFSIZ];
1888#ifndef OPENSSL_NO_KRB5
1889 char *client_princ;
1890#endif
1891#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG) 1878#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
1892 const unsigned char *next_proto_neg; 1879 const unsigned char *next_proto_neg;
1893 unsigned next_proto_neg_len; 1880 unsigned next_proto_neg_len;
@@ -1951,13 +1938,6 @@ init_ssl_connection(SSL * con)
1951 TLS1_FLAGS_TLS_PADDING_BUG) 1938 TLS1_FLAGS_TLS_PADDING_BUG)
1952 BIO_printf(bio_s_out, 1939 BIO_printf(bio_s_out,
1953 "Peer has incorrect TLSv1 block padding\n"); 1940 "Peer has incorrect TLSv1 block padding\n");
1954#ifndef OPENSSL_NO_KRB5
1955 client_princ = kssl_ctx_get0_client_princ(SSL_get0_kssl_ctx(con));
1956 if (client_princ != NULL) {
1957 BIO_printf(bio_s_out, "Kerberos peer principal is %s\n",
1958 client_princ);
1959 }
1960#endif /* OPENSSL_NO_KRB5 */
1961 BIO_printf(bio_s_out, "Secure Renegotiation IS%s supported\n", 1941 BIO_printf(bio_s_out, "Secure Renegotiation IS%s supported\n",
1962 SSL_get_secure_renegotiation_support(con) ? "" : " NOT"); 1942 SSL_get_secure_renegotiation_support(con) ? "" : " NOT");
1963 if (keymatexportlabel != NULL) { 1943 if (keymatexportlabel != NULL) {
@@ -2002,9 +1982,6 @@ err:
2002 return (ret); 1982 return (ret);
2003} 1983}
2004#endif 1984#endif
2005#ifndef OPENSSL_NO_KRB5
2006char *client_princ;
2007#endif
2008 1985
2009#if 0 1986#if 0
2010static int 1987static int
@@ -2037,9 +2014,6 @@ www_body(char *hostname, int s, unsigned char *context)
2037 SSL *con; 2014 SSL *con;
2038 const SSL_CIPHER *c; 2015 const SSL_CIPHER *c;
2039 BIO *io, *ssl_bio, *sbio; 2016 BIO *io, *ssl_bio, *sbio;
2040#ifndef OPENSSL_NO_KRB5
2041 KSSL_CTX *kctx;
2042#endif
2043 2017
2044 buf = malloc(bufsize); 2018 buf = malloc(bufsize);
2045 if (buf == NULL) 2019 if (buf == NULL)
@@ -2070,12 +2044,6 @@ www_body(char *hostname, int s, unsigned char *context)
2070 SSL_set_tlsext_debug_arg(con, bio_s_out); 2044 SSL_set_tlsext_debug_arg(con, bio_s_out);
2071 } 2045 }
2072#endif 2046#endif
2073#ifndef OPENSSL_NO_KRB5
2074 if ((kctx = kssl_ctx_new()) != NULL) {
2075 kssl_ctx_setstring(kctx, KSSL_SERVICE, KRB5SVC);
2076 kssl_ctx_setstring(kctx, KSSL_KEYTAB, KRB5KEYTAB);
2077 }
2078#endif /* OPENSSL_NO_KRB5 */
2079 if (context) 2047 if (context)
2080 SSL_set_session_id_context(con, context, 2048 SSL_set_session_id_context(con, context,
2081 strlen((char *) context)); 2049 strlen((char *) context));