diff options
| author | tb <> | 2024-08-31 09:14:21 +0000 |
|---|---|---|
| committer | tb <> | 2024-08-31 09:14:21 +0000 |
| commit | 4d0ecb9ca6915541794e3cc736907b89e9a1dd6c (patch) | |
| tree | 797124b4a826431ab1cb43dcdf84f0684f586817 /src/lib/libcrypto/evp/pmeth_gn.c | |
| parent | 2222e130b7bcfb051ee4a7bf04f3a198fd5b0daf (diff) | |
| download | openbsd-4d0ecb9ca6915541794e3cc736907b89e9a1dd6c.tar.gz openbsd-4d0ecb9ca6915541794e3cc736907b89e9a1dd6c.tar.bz2 openbsd-4d0ecb9ca6915541794e3cc736907b89e9a1dd6c.zip | |
Remove EVP_PKEY_*check again
This API turned out to be a really bad idea. OpenSSL 3 extended it, with
the result that basically every key type had its own DoS issues fixed in
a recent security release. We eschewed these by having some upper bounds
that kick in when keys get insanely large.
Initially added on tobhe's request who fortunately never used it in iked,
this was picked up only by ruby/openssl (one of the rare projects doing
proper configure checks rather than branching on VERSION defines) and of
course xca, since it uses everything it can. So it was easy to get rid of
this again.
ok beck jsing
Diffstat (limited to 'src/lib/libcrypto/evp/pmeth_gn.c')
| -rw-r--r-- | src/lib/libcrypto/evp/pmeth_gn.c | 30 |
1 files changed, 1 insertions, 29 deletions
diff --git a/src/lib/libcrypto/evp/pmeth_gn.c b/src/lib/libcrypto/evp/pmeth_gn.c index 415690cd0e..bc1c5bd7d2 100644 --- a/src/lib/libcrypto/evp/pmeth_gn.c +++ b/src/lib/libcrypto/evp/pmeth_gn.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: pmeth_gn.c,v 1.20 2024/08/29 16:58:19 tb Exp $ */ | 1 | /* $OpenBSD: pmeth_gn.c,v 1.21 2024/08/31 09:14:21 tb Exp $ */ |
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
| 3 | * project 2006. | 3 | * project 2006. |
| 4 | */ | 4 | */ |
| @@ -225,31 +225,3 @@ merr: | |||
| 225 | return mac_key; | 225 | return mac_key; |
| 226 | } | 226 | } |
| 227 | LCRYPTO_ALIAS(EVP_PKEY_new_mac_key); | 227 | LCRYPTO_ALIAS(EVP_PKEY_new_mac_key); |
| 228 | |||
| 229 | /* | ||
| 230 | * XXX - remove the API below in the next bump. | ||
| 231 | */ | ||
| 232 | |||
| 233 | int | ||
| 234 | EVP_PKEY_check(EVP_PKEY_CTX *ctx) | ||
| 235 | { | ||
| 236 | EVPerror(ERR_R_DISABLED); | ||
| 237 | return -2; | ||
| 238 | } | ||
| 239 | LCRYPTO_ALIAS(EVP_PKEY_check); | ||
| 240 | |||
| 241 | int | ||
| 242 | EVP_PKEY_public_check(EVP_PKEY_CTX *ctx) | ||
| 243 | { | ||
| 244 | EVPerror(ERR_R_DISABLED); | ||
| 245 | return -2; | ||
| 246 | } | ||
| 247 | LCRYPTO_ALIAS(EVP_PKEY_public_check); | ||
| 248 | |||
| 249 | int | ||
| 250 | EVP_PKEY_param_check(EVP_PKEY_CTX *ctx) | ||
| 251 | { | ||
| 252 | EVPerror(ERR_R_DISABLED); | ||
| 253 | return -2; | ||
| 254 | } | ||
| 255 | LCRYPTO_ALIAS(EVP_PKEY_param_check); | ||
