diff options
author | jsing <> | 2014-06-11 15:44:10 +0000 |
---|---|---|
committer | jsing <> | 2014-06-11 15:44:10 +0000 |
commit | ad76fc8ee191ac27c7614f9a37b6a8c1cc615aca (patch) | |
tree | 23c29a9b227b6cf2aa9a0d1c5ed3ac92301238aa | |
parent | c4fc3df7be0ef90c4545231ed4e9038d207bf0ed (diff) | |
download | openbsd-ad76fc8ee191ac27c7614f9a37b6a8c1cc615aca.tar.gz openbsd-ad76fc8ee191ac27c7614f9a37b6a8c1cc615aca.tar.bz2 openbsd-ad76fc8ee191ac27c7614f9a37b6a8c1cc615aca.zip |
Stop setting the EVP_MD_CTX_FLAG_NON_FIPS_ALLOW - it has been ignored since
OpenSSL 1.0.0.
ok miod@ (a little while back)
-rw-r--r-- | src/lib/libcrypto/x509/x509_cmp.c | 1 | ||||
-rw-r--r-- | src/lib/libssl/s3_clnt.c | 2 | ||||
-rw-r--r-- | src/lib/libssl/s3_srvr.c | 2 | ||||
-rw-r--r-- | src/lib/libssl/src/crypto/x509/x509_cmp.c | 1 | ||||
-rw-r--r-- | src/lib/libssl/src/ssl/s3_clnt.c | 2 | ||||
-rw-r--r-- | src/lib/libssl/src/ssl/s3_enc.c | 3 | ||||
-rw-r--r-- | src/lib/libssl/src/ssl/s3_srvr.c | 2 | ||||
-rw-r--r-- | src/lib/libssl/src/ssl/t1_enc.c | 2 | ||||
-rw-r--r-- | src/lib/libssl/t1_enc.c | 2 |
9 files changed, 0 insertions, 17 deletions
diff --git a/src/lib/libcrypto/x509/x509_cmp.c b/src/lib/libcrypto/x509/x509_cmp.c index b6b3423e3f..8877c6e284 100644 --- a/src/lib/libcrypto/x509/x509_cmp.c +++ b/src/lib/libcrypto/x509/x509_cmp.c | |||
@@ -258,7 +258,6 @@ X509_NAME_hash_old(X509_NAME *x) | |||
258 | /* Make sure X509_NAME structure contains valid cached encoding */ | 258 | /* Make sure X509_NAME structure contains valid cached encoding */ |
259 | i2d_X509_NAME(x, NULL); | 259 | i2d_X509_NAME(x, NULL); |
260 | EVP_MD_CTX_init(&md_ctx); | 260 | EVP_MD_CTX_init(&md_ctx); |
261 | EVP_MD_CTX_set_flags(&md_ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW); | ||
262 | if (EVP_DigestInit_ex(&md_ctx, EVP_md5(), NULL) && | 261 | if (EVP_DigestInit_ex(&md_ctx, EVP_md5(), NULL) && |
263 | EVP_DigestUpdate(&md_ctx, x->bytes->data, x->bytes->length) && | 262 | EVP_DigestUpdate(&md_ctx, x->bytes->data, x->bytes->length) && |
264 | EVP_DigestFinal_ex(&md_ctx, md, NULL)) | 263 | EVP_DigestFinal_ex(&md_ctx, md, NULL)) |
diff --git a/src/lib/libssl/s3_clnt.c b/src/lib/libssl/s3_clnt.c index 45dfb64f92..e86d58c671 100644 --- a/src/lib/libssl/s3_clnt.c +++ b/src/lib/libssl/s3_clnt.c | |||
@@ -1603,8 +1603,6 @@ ssl3_get_key_exchange(SSL *s) | |||
1603 | j = 0; | 1603 | j = 0; |
1604 | q = md_buf; | 1604 | q = md_buf; |
1605 | for (num = 2; num > 0; num--) { | 1605 | for (num = 2; num > 0; num--) { |
1606 | EVP_MD_CTX_set_flags(&md_ctx, | ||
1607 | EVP_MD_CTX_FLAG_NON_FIPS_ALLOW); | ||
1608 | EVP_DigestInit_ex(&md_ctx, | 1606 | EVP_DigestInit_ex(&md_ctx, |
1609 | (num == 2) ? s->ctx->md5 : s->ctx->sha1, | 1607 | (num == 2) ? s->ctx->md5 : s->ctx->sha1, |
1610 | NULL); | 1608 | NULL); |
diff --git a/src/lib/libssl/s3_srvr.c b/src/lib/libssl/s3_srvr.c index 9dc944706f..6bf4def27d 100644 --- a/src/lib/libssl/s3_srvr.c +++ b/src/lib/libssl/s3_srvr.c | |||
@@ -1793,8 +1793,6 @@ ssl3_send_server_key_exchange(SSL *s) | |||
1793 | q = md_buf; | 1793 | q = md_buf; |
1794 | j = 0; | 1794 | j = 0; |
1795 | for (num = 2; num > 0; num--) { | 1795 | for (num = 2; num > 0; num--) { |
1796 | EVP_MD_CTX_set_flags(&md_ctx, | ||
1797 | EVP_MD_CTX_FLAG_NON_FIPS_ALLOW); | ||
1798 | EVP_DigestInit_ex(&md_ctx, | 1796 | EVP_DigestInit_ex(&md_ctx, |
1799 | (num == 2) ? s->ctx->md5 : | 1797 | (num == 2) ? s->ctx->md5 : |
1800 | s->ctx->sha1, NULL); | 1798 | s->ctx->sha1, NULL); |
diff --git a/src/lib/libssl/src/crypto/x509/x509_cmp.c b/src/lib/libssl/src/crypto/x509/x509_cmp.c index b6b3423e3f..8877c6e284 100644 --- a/src/lib/libssl/src/crypto/x509/x509_cmp.c +++ b/src/lib/libssl/src/crypto/x509/x509_cmp.c | |||
@@ -258,7 +258,6 @@ X509_NAME_hash_old(X509_NAME *x) | |||
258 | /* Make sure X509_NAME structure contains valid cached encoding */ | 258 | /* Make sure X509_NAME structure contains valid cached encoding */ |
259 | i2d_X509_NAME(x, NULL); | 259 | i2d_X509_NAME(x, NULL); |
260 | EVP_MD_CTX_init(&md_ctx); | 260 | EVP_MD_CTX_init(&md_ctx); |
261 | EVP_MD_CTX_set_flags(&md_ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW); | ||
262 | if (EVP_DigestInit_ex(&md_ctx, EVP_md5(), NULL) && | 261 | if (EVP_DigestInit_ex(&md_ctx, EVP_md5(), NULL) && |
263 | EVP_DigestUpdate(&md_ctx, x->bytes->data, x->bytes->length) && | 262 | EVP_DigestUpdate(&md_ctx, x->bytes->data, x->bytes->length) && |
264 | EVP_DigestFinal_ex(&md_ctx, md, NULL)) | 263 | EVP_DigestFinal_ex(&md_ctx, md, NULL)) |
diff --git a/src/lib/libssl/src/ssl/s3_clnt.c b/src/lib/libssl/src/ssl/s3_clnt.c index 45dfb64f92..e86d58c671 100644 --- a/src/lib/libssl/src/ssl/s3_clnt.c +++ b/src/lib/libssl/src/ssl/s3_clnt.c | |||
@@ -1603,8 +1603,6 @@ ssl3_get_key_exchange(SSL *s) | |||
1603 | j = 0; | 1603 | j = 0; |
1604 | q = md_buf; | 1604 | q = md_buf; |
1605 | for (num = 2; num > 0; num--) { | 1605 | for (num = 2; num > 0; num--) { |
1606 | EVP_MD_CTX_set_flags(&md_ctx, | ||
1607 | EVP_MD_CTX_FLAG_NON_FIPS_ALLOW); | ||
1608 | EVP_DigestInit_ex(&md_ctx, | 1606 | EVP_DigestInit_ex(&md_ctx, |
1609 | (num == 2) ? s->ctx->md5 : s->ctx->sha1, | 1607 | (num == 2) ? s->ctx->md5 : s->ctx->sha1, |
1610 | NULL); | 1608 | NULL); |
diff --git a/src/lib/libssl/src/ssl/s3_enc.c b/src/lib/libssl/src/ssl/s3_enc.c index 71a3155c60..1f7c592a64 100644 --- a/src/lib/libssl/src/ssl/s3_enc.c +++ b/src/lib/libssl/src/ssl/s3_enc.c | |||
@@ -172,7 +172,6 @@ ssl3_generate_key_block(SSL *s, unsigned char *km, int num) | |||
172 | 172 | ||
173 | k = 0; | 173 | k = 0; |
174 | EVP_MD_CTX_init(&m5); | 174 | EVP_MD_CTX_init(&m5); |
175 | EVP_MD_CTX_set_flags(&m5, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW); | ||
176 | EVP_MD_CTX_init(&s1); | 175 | EVP_MD_CTX_init(&s1); |
177 | for (i = 0; (int)i < num; i += MD5_DIGEST_LENGTH) { | 176 | for (i = 0; (int)i < num; i += MD5_DIGEST_LENGTH) { |
178 | k++; | 177 | k++; |
@@ -667,8 +666,6 @@ ssl3_handshake_mac(SSL *s, int md_nid, const char *sender, int len, | |||
667 | return 0; | 666 | return 0; |
668 | } | 667 | } |
669 | EVP_MD_CTX_init(&ctx); | 668 | EVP_MD_CTX_init(&ctx); |
670 | EVP_MD_CTX_set_flags(&ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW); | ||
671 | |||
672 | if (!EVP_MD_CTX_copy_ex(&ctx, d)) | 669 | if (!EVP_MD_CTX_copy_ex(&ctx, d)) |
673 | return 0; | 670 | return 0; |
674 | n = EVP_MD_CTX_size(&ctx); | 671 | n = EVP_MD_CTX_size(&ctx); |
diff --git a/src/lib/libssl/src/ssl/s3_srvr.c b/src/lib/libssl/src/ssl/s3_srvr.c index 9dc944706f..6bf4def27d 100644 --- a/src/lib/libssl/src/ssl/s3_srvr.c +++ b/src/lib/libssl/src/ssl/s3_srvr.c | |||
@@ -1793,8 +1793,6 @@ ssl3_send_server_key_exchange(SSL *s) | |||
1793 | q = md_buf; | 1793 | q = md_buf; |
1794 | j = 0; | 1794 | j = 0; |
1795 | for (num = 2; num > 0; num--) { | 1795 | for (num = 2; num > 0; num--) { |
1796 | EVP_MD_CTX_set_flags(&md_ctx, | ||
1797 | EVP_MD_CTX_FLAG_NON_FIPS_ALLOW); | ||
1798 | EVP_DigestInit_ex(&md_ctx, | 1796 | EVP_DigestInit_ex(&md_ctx, |
1799 | (num == 2) ? s->ctx->md5 : | 1797 | (num == 2) ? s->ctx->md5 : |
1800 | s->ctx->sha1, NULL); | 1798 | s->ctx->sha1, NULL); |
diff --git a/src/lib/libssl/src/ssl/t1_enc.c b/src/lib/libssl/src/ssl/t1_enc.c index 922d44ad4e..eaf53b48cc 100644 --- a/src/lib/libssl/src/ssl/t1_enc.c +++ b/src/lib/libssl/src/ssl/t1_enc.c | |||
@@ -165,8 +165,6 @@ tls1_P_hash(const EVP_MD *md, const unsigned char *sec, int sec_len, | |||
165 | 165 | ||
166 | EVP_MD_CTX_init(&ctx); | 166 | EVP_MD_CTX_init(&ctx); |
167 | EVP_MD_CTX_init(&ctx_tmp); | 167 | EVP_MD_CTX_init(&ctx_tmp); |
168 | EVP_MD_CTX_set_flags(&ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW); | ||
169 | EVP_MD_CTX_set_flags(&ctx_tmp, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW); | ||
170 | mac_key = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, NULL, sec, sec_len); | 168 | mac_key = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, NULL, sec, sec_len); |
171 | if (!mac_key) | 169 | if (!mac_key) |
172 | goto err; | 170 | goto err; |
diff --git a/src/lib/libssl/t1_enc.c b/src/lib/libssl/t1_enc.c index 922d44ad4e..eaf53b48cc 100644 --- a/src/lib/libssl/t1_enc.c +++ b/src/lib/libssl/t1_enc.c | |||
@@ -165,8 +165,6 @@ tls1_P_hash(const EVP_MD *md, const unsigned char *sec, int sec_len, | |||
165 | 165 | ||
166 | EVP_MD_CTX_init(&ctx); | 166 | EVP_MD_CTX_init(&ctx); |
167 | EVP_MD_CTX_init(&ctx_tmp); | 167 | EVP_MD_CTX_init(&ctx_tmp); |
168 | EVP_MD_CTX_set_flags(&ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW); | ||
169 | EVP_MD_CTX_set_flags(&ctx_tmp, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW); | ||
170 | mac_key = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, NULL, sec, sec_len); | 168 | mac_key = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, NULL, sec, sec_len); |
171 | if (!mac_key) | 169 | if (!mac_key) |
172 | goto err; | 170 | goto err; |