diff options
author | tedu <> | 2014-05-29 18:11:13 +0000 |
---|---|---|
committer | tedu <> | 2014-05-29 18:11:13 +0000 |
commit | 36abfd12740be4329b29e295bfcee8fe22c637d4 (patch) | |
tree | e214d026b5b66638630daa4617eb61197c96abb9 /src/lib/libssl/d1_srvr.c | |
parent | 2aab478749f62f40d50f6200a1396b6352051369 (diff) | |
download | openbsd-36abfd12740be4329b29e295bfcee8fe22c637d4.tar.gz openbsd-36abfd12740be4329b29e295bfcee8fe22c637d4.tar.bz2 openbsd-36abfd12740be4329b29e295bfcee8fe22c637d4.zip |
unidef DH, ECDH, and ECDSA. there's no purpose to a libssl without them.
ok deraadt jsing
Diffstat (limited to '')
-rw-r--r-- | src/lib/libssl/d1_srvr.c | 16 |
1 files changed, 0 insertions, 16 deletions
diff --git a/src/lib/libssl/d1_srvr.c b/src/lib/libssl/d1_srvr.c index c8bfc1b03d..3f872de48b 100644 --- a/src/lib/libssl/d1_srvr.c +++ b/src/lib/libssl/d1_srvr.c | |||
@@ -122,9 +122,7 @@ | |||
122 | #include <openssl/x509.h> | 122 | #include <openssl/x509.h> |
123 | #include <openssl/md5.h> | 123 | #include <openssl/md5.h> |
124 | #include <openssl/bn.h> | 124 | #include <openssl/bn.h> |
125 | #ifndef OPENSSL_NO_DH | ||
126 | #include <openssl/dh.h> | 125 | #include <openssl/dh.h> |
127 | #endif | ||
128 | 126 | ||
129 | static const SSL_METHOD *dtls1_get_server_method(int ver); | 127 | static const SSL_METHOD *dtls1_get_server_method(int ver); |
130 | static int dtls1_send_hello_verify_request(SSL *s); | 128 | static int dtls1_send_hello_verify_request(SSL *s); |
@@ -1036,17 +1034,13 @@ dtls1_send_server_key_exchange(SSL *s) | |||
1036 | RSA *rsa; | 1034 | RSA *rsa; |
1037 | unsigned char md_buf[MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH]; | 1035 | unsigned char md_buf[MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH]; |
1038 | unsigned int u; | 1036 | unsigned int u; |
1039 | #ifndef OPENSSL_NO_DH | ||
1040 | DH *dh = NULL, *dhp; | 1037 | DH *dh = NULL, *dhp; |
1041 | #endif | ||
1042 | #ifndef OPENSSL_NO_ECDH | ||
1043 | EC_KEY *ecdh = NULL, *ecdhp; | 1038 | EC_KEY *ecdh = NULL, *ecdhp; |
1044 | unsigned char *encodedPoint = NULL; | 1039 | unsigned char *encodedPoint = NULL; |
1045 | int encodedlen = 0; | 1040 | int encodedlen = 0; |
1046 | int curve_id = 0; | 1041 | int curve_id = 0; |
1047 | BN_CTX *bn_ctx = NULL; | 1042 | BN_CTX *bn_ctx = NULL; |
1048 | 1043 | ||
1049 | #endif | ||
1050 | #ifndef OPENSSL_NO_PSK | 1044 | #ifndef OPENSSL_NO_PSK |
1051 | size_t pskhintlen = 0; | 1045 | size_t pskhintlen = 0; |
1052 | #endif | 1046 | #endif |
@@ -1093,7 +1087,6 @@ dtls1_send_server_key_exchange(SSL *s) | |||
1093 | r[1] = rsa->e; | 1087 | r[1] = rsa->e; |
1094 | s->s3->tmp.use_rsa_tmp = 1; | 1088 | s->s3->tmp.use_rsa_tmp = 1; |
1095 | } else | 1089 | } else |
1096 | #ifndef OPENSSL_NO_DH | ||
1097 | if (type & SSL_kEDH) { | 1090 | if (type & SSL_kEDH) { |
1098 | dhp = cert->dh_tmp; | 1091 | dhp = cert->dh_tmp; |
1099 | if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL)) | 1092 | if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL)) |
@@ -1138,8 +1131,6 @@ dtls1_send_server_key_exchange(SSL *s) | |||
1138 | r[1] = dh->g; | 1131 | r[1] = dh->g; |
1139 | r[2] = dh->pub_key; | 1132 | r[2] = dh->pub_key; |
1140 | } else | 1133 | } else |
1141 | #endif | ||
1142 | #ifndef OPENSSL_NO_ECDH | ||
1143 | if (type & SSL_kEECDH) { | 1134 | if (type & SSL_kEECDH) { |
1144 | const EC_GROUP *group; | 1135 | const EC_GROUP *group; |
1145 | 1136 | ||
@@ -1252,7 +1243,6 @@ dtls1_send_server_key_exchange(SSL *s) | |||
1252 | r[2] = NULL; | 1243 | r[2] = NULL; |
1253 | r[3] = NULL; | 1244 | r[3] = NULL; |
1254 | } else | 1245 | } else |
1255 | #endif /* !OPENSSL_NO_ECDH */ | ||
1256 | #ifndef OPENSSL_NO_PSK | 1246 | #ifndef OPENSSL_NO_PSK |
1257 | if (type & SSL_kPSK) { | 1247 | if (type & SSL_kPSK) { |
1258 | pskhintlen = strlen(s->ctx->psk_identity_hint); | 1248 | pskhintlen = strlen(s->ctx->psk_identity_hint); |
@@ -1296,7 +1286,6 @@ dtls1_send_server_key_exchange(SSL *s) | |||
1296 | p += nr[i]; | 1286 | p += nr[i]; |
1297 | } | 1287 | } |
1298 | 1288 | ||
1299 | #ifndef OPENSSL_NO_ECDH | ||
1300 | if (type & SSL_kEECDH) { | 1289 | if (type & SSL_kEECDH) { |
1301 | /* XXX: For now, we only support named (not generic) curves. | 1290 | /* XXX: For now, we only support named (not generic) curves. |
1302 | * In this situation, the serverKeyExchange message has: | 1291 | * In this situation, the serverKeyExchange message has: |
@@ -1318,7 +1307,6 @@ dtls1_send_server_key_exchange(SSL *s) | |||
1318 | encodedPoint = NULL; | 1307 | encodedPoint = NULL; |
1319 | p += encodedlen; | 1308 | p += encodedlen; |
1320 | } | 1309 | } |
1321 | #endif | ||
1322 | 1310 | ||
1323 | #ifndef OPENSSL_NO_PSK | 1311 | #ifndef OPENSSL_NO_PSK |
1324 | if (type & SSL_kPSK) { | 1312 | if (type & SSL_kPSK) { |
@@ -1376,7 +1364,6 @@ dtls1_send_server_key_exchange(SSL *s) | |||
1376 | s2n(i, p); | 1364 | s2n(i, p); |
1377 | n += i + 2; | 1365 | n += i + 2; |
1378 | } else | 1366 | } else |
1379 | #if !defined(OPENSSL_NO_ECDSA) | ||
1380 | if (pkey->type == EVP_PKEY_EC) { | 1367 | if (pkey->type == EVP_PKEY_EC) { |
1381 | /* let's do ECDSA */ | 1368 | /* let's do ECDSA */ |
1382 | EVP_SignInit_ex(&md_ctx, EVP_ecdsa(), NULL); | 1369 | EVP_SignInit_ex(&md_ctx, EVP_ecdsa(), NULL); |
@@ -1391,7 +1378,6 @@ dtls1_send_server_key_exchange(SSL *s) | |||
1391 | s2n(i, p); | 1378 | s2n(i, p); |
1392 | n += i + 2; | 1379 | n += i + 2; |
1393 | } else | 1380 | } else |
1394 | #endif | ||
1395 | { | 1381 | { |
1396 | /* Is this error check actually needed? */ | 1382 | /* Is this error check actually needed? */ |
1397 | al = SSL_AD_HANDSHAKE_FAILURE; | 1383 | al = SSL_AD_HANDSHAKE_FAILURE; |
@@ -1418,10 +1404,8 @@ dtls1_send_server_key_exchange(SSL *s) | |||
1418 | f_err: | 1404 | f_err: |
1419 | ssl3_send_alert(s, SSL3_AL_FATAL, al); | 1405 | ssl3_send_alert(s, SSL3_AL_FATAL, al); |
1420 | err: | 1406 | err: |
1421 | #ifndef OPENSSL_NO_ECDH | ||
1422 | free(encodedPoint); | 1407 | free(encodedPoint); |
1423 | BN_CTX_free(bn_ctx); | 1408 | BN_CTX_free(bn_ctx); |
1424 | #endif | ||
1425 | EVP_MD_CTX_cleanup(&md_ctx); | 1409 | EVP_MD_CTX_cleanup(&md_ctx); |
1426 | return (-1); | 1410 | return (-1); |
1427 | } | 1411 | } |