summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/evp/pmeth_gn.c
diff options
context:
space:
mode:
authortb <>2024-08-31 09:14:21 +0000
committertb <>2024-08-31 09:14:21 +0000
commit4d0ecb9ca6915541794e3cc736907b89e9a1dd6c (patch)
tree797124b4a826431ab1cb43dcdf84f0684f586817 /src/lib/libcrypto/evp/pmeth_gn.c
parent2222e130b7bcfb051ee4a7bf04f3a198fd5b0daf (diff)
downloadopenbsd-4d0ecb9ca6915541794e3cc736907b89e9a1dd6c.tar.gz
openbsd-4d0ecb9ca6915541794e3cc736907b89e9a1dd6c.tar.bz2
openbsd-4d0ecb9ca6915541794e3cc736907b89e9a1dd6c.zip
Remove EVP_PKEY_*check again
This API turned out to be a really bad idea. OpenSSL 3 extended it, with the result that basically every key type had its own DoS issues fixed in a recent security release. We eschewed these by having some upper bounds that kick in when keys get insanely large. Initially added on tobhe's request who fortunately never used it in iked, this was picked up only by ruby/openssl (one of the rare projects doing proper configure checks rather than branching on VERSION defines) and of course xca, since it uses everything it can. So it was easy to get rid of this again. ok beck jsing
Diffstat (limited to 'src/lib/libcrypto/evp/pmeth_gn.c')
-rw-r--r--src/lib/libcrypto/evp/pmeth_gn.c30
1 files changed, 1 insertions, 29 deletions
diff --git a/src/lib/libcrypto/evp/pmeth_gn.c b/src/lib/libcrypto/evp/pmeth_gn.c
index 415690cd0e..bc1c5bd7d2 100644
--- a/src/lib/libcrypto/evp/pmeth_gn.c
+++ b/src/lib/libcrypto/evp/pmeth_gn.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: pmeth_gn.c,v 1.20 2024/08/29 16:58:19 tb Exp $ */ 1/* $OpenBSD: pmeth_gn.c,v 1.21 2024/08/31 09:14:21 tb Exp $ */
2/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL 2/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
3 * project 2006. 3 * project 2006.
4 */ 4 */
@@ -225,31 +225,3 @@ merr:
225 return mac_key; 225 return mac_key;
226} 226}
227LCRYPTO_ALIAS(EVP_PKEY_new_mac_key); 227LCRYPTO_ALIAS(EVP_PKEY_new_mac_key);
228
229/*
230 * XXX - remove the API below in the next bump.
231 */
232
233int
234EVP_PKEY_check(EVP_PKEY_CTX *ctx)
235{
236 EVPerror(ERR_R_DISABLED);
237 return -2;
238}
239LCRYPTO_ALIAS(EVP_PKEY_check);
240
241int
242EVP_PKEY_public_check(EVP_PKEY_CTX *ctx)
243{
244 EVPerror(ERR_R_DISABLED);
245 return -2;
246}
247LCRYPTO_ALIAS(EVP_PKEY_public_check);
248
249int
250EVP_PKEY_param_check(EVP_PKEY_CTX *ctx)
251{
252 EVPerror(ERR_R_DISABLED);
253 return -2;
254}
255LCRYPTO_ALIAS(EVP_PKEY_param_check);