summaryrefslogtreecommitdiff
path: root/src/lib/libssl/d1_srvr.c
diff options
context:
space:
mode:
authortedu <>2014-05-29 18:11:13 +0000
committertedu <>2014-05-29 18:11:13 +0000
commit36abfd12740be4329b29e295bfcee8fe22c637d4 (patch)
treee214d026b5b66638630daa4617eb61197c96abb9 /src/lib/libssl/d1_srvr.c
parent2aab478749f62f40d50f6200a1396b6352051369 (diff)
downloadopenbsd-36abfd12740be4329b29e295bfcee8fe22c637d4.tar.gz
openbsd-36abfd12740be4329b29e295bfcee8fe22c637d4.tar.bz2
openbsd-36abfd12740be4329b29e295bfcee8fe22c637d4.zip
unidef DH, ECDH, and ECDSA. there's no purpose to a libssl without them.
ok deraadt jsing
Diffstat (limited to '')
-rw-r--r--src/lib/libssl/d1_srvr.c16
1 files changed, 0 insertions, 16 deletions
diff --git a/src/lib/libssl/d1_srvr.c b/src/lib/libssl/d1_srvr.c
index c8bfc1b03d..3f872de48b 100644
--- a/src/lib/libssl/d1_srvr.c
+++ b/src/lib/libssl/d1_srvr.c
@@ -122,9 +122,7 @@
122#include <openssl/x509.h> 122#include <openssl/x509.h>
123#include <openssl/md5.h> 123#include <openssl/md5.h>
124#include <openssl/bn.h> 124#include <openssl/bn.h>
125#ifndef OPENSSL_NO_DH
126#include <openssl/dh.h> 125#include <openssl/dh.h>
127#endif
128 126
129static const SSL_METHOD *dtls1_get_server_method(int ver); 127static const SSL_METHOD *dtls1_get_server_method(int ver);
130static int dtls1_send_hello_verify_request(SSL *s); 128static int dtls1_send_hello_verify_request(SSL *s);
@@ -1036,17 +1034,13 @@ dtls1_send_server_key_exchange(SSL *s)
1036 RSA *rsa; 1034 RSA *rsa;
1037 unsigned char md_buf[MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH]; 1035 unsigned char md_buf[MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH];
1038 unsigned int u; 1036 unsigned int u;
1039#ifndef OPENSSL_NO_DH
1040 DH *dh = NULL, *dhp; 1037 DH *dh = NULL, *dhp;
1041#endif
1042#ifndef OPENSSL_NO_ECDH
1043 EC_KEY *ecdh = NULL, *ecdhp; 1038 EC_KEY *ecdh = NULL, *ecdhp;
1044 unsigned char *encodedPoint = NULL; 1039 unsigned char *encodedPoint = NULL;
1045 int encodedlen = 0; 1040 int encodedlen = 0;
1046 int curve_id = 0; 1041 int curve_id = 0;
1047 BN_CTX *bn_ctx = NULL; 1042 BN_CTX *bn_ctx = NULL;
1048 1043
1049#endif
1050#ifndef OPENSSL_NO_PSK 1044#ifndef OPENSSL_NO_PSK
1051 size_t pskhintlen = 0; 1045 size_t pskhintlen = 0;
1052#endif 1046#endif
@@ -1093,7 +1087,6 @@ dtls1_send_server_key_exchange(SSL *s)
1093 r[1] = rsa->e; 1087 r[1] = rsa->e;
1094 s->s3->tmp.use_rsa_tmp = 1; 1088 s->s3->tmp.use_rsa_tmp = 1;
1095 } else 1089 } else
1096#ifndef OPENSSL_NO_DH
1097 if (type & SSL_kEDH) { 1090 if (type & SSL_kEDH) {
1098 dhp = cert->dh_tmp; 1091 dhp = cert->dh_tmp;
1099 if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL)) 1092 if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL))
@@ -1138,8 +1131,6 @@ dtls1_send_server_key_exchange(SSL *s)
1138 r[1] = dh->g; 1131 r[1] = dh->g;
1139 r[2] = dh->pub_key; 1132 r[2] = dh->pub_key;
1140 } else 1133 } else
1141#endif
1142#ifndef OPENSSL_NO_ECDH
1143 if (type & SSL_kEECDH) { 1134 if (type & SSL_kEECDH) {
1144 const EC_GROUP *group; 1135 const EC_GROUP *group;
1145 1136
@@ -1252,7 +1243,6 @@ dtls1_send_server_key_exchange(SSL *s)
1252 r[2] = NULL; 1243 r[2] = NULL;
1253 r[3] = NULL; 1244 r[3] = NULL;
1254 } else 1245 } else
1255#endif /* !OPENSSL_NO_ECDH */
1256#ifndef OPENSSL_NO_PSK 1246#ifndef OPENSSL_NO_PSK
1257 if (type & SSL_kPSK) { 1247 if (type & SSL_kPSK) {
1258 pskhintlen = strlen(s->ctx->psk_identity_hint); 1248 pskhintlen = strlen(s->ctx->psk_identity_hint);
@@ -1296,7 +1286,6 @@ dtls1_send_server_key_exchange(SSL *s)
1296 p += nr[i]; 1286 p += nr[i];
1297 } 1287 }
1298 1288
1299#ifndef OPENSSL_NO_ECDH
1300 if (type & SSL_kEECDH) { 1289 if (type & SSL_kEECDH) {
1301 /* XXX: For now, we only support named (not generic) curves. 1290 /* XXX: For now, we only support named (not generic) curves.
1302 * In this situation, the serverKeyExchange message has: 1291 * In this situation, the serverKeyExchange message has:
@@ -1318,7 +1307,6 @@ dtls1_send_server_key_exchange(SSL *s)
1318 encodedPoint = NULL; 1307 encodedPoint = NULL;
1319 p += encodedlen; 1308 p += encodedlen;
1320 } 1309 }
1321#endif
1322 1310
1323#ifndef OPENSSL_NO_PSK 1311#ifndef OPENSSL_NO_PSK
1324 if (type & SSL_kPSK) { 1312 if (type & SSL_kPSK) {
@@ -1376,7 +1364,6 @@ dtls1_send_server_key_exchange(SSL *s)
1376 s2n(i, p); 1364 s2n(i, p);
1377 n += i + 2; 1365 n += i + 2;
1378 } else 1366 } else
1379#if !defined(OPENSSL_NO_ECDSA)
1380 if (pkey->type == EVP_PKEY_EC) { 1367 if (pkey->type == EVP_PKEY_EC) {
1381 /* let's do ECDSA */ 1368 /* let's do ECDSA */
1382 EVP_SignInit_ex(&md_ctx, EVP_ecdsa(), NULL); 1369 EVP_SignInit_ex(&md_ctx, EVP_ecdsa(), NULL);
@@ -1391,7 +1378,6 @@ dtls1_send_server_key_exchange(SSL *s)
1391 s2n(i, p); 1378 s2n(i, p);
1392 n += i + 2; 1379 n += i + 2;
1393 } else 1380 } else
1394#endif
1395 { 1381 {
1396 /* Is this error check actually needed? */ 1382 /* Is this error check actually needed? */
1397 al = SSL_AD_HANDSHAKE_FAILURE; 1383 al = SSL_AD_HANDSHAKE_FAILURE;
@@ -1418,10 +1404,8 @@ dtls1_send_server_key_exchange(SSL *s)
1418f_err: 1404f_err:
1419 ssl3_send_alert(s, SSL3_AL_FATAL, al); 1405 ssl3_send_alert(s, SSL3_AL_FATAL, al);
1420err: 1406err:
1421#ifndef OPENSSL_NO_ECDH
1422 free(encodedPoint); 1407 free(encodedPoint);
1423 BN_CTX_free(bn_ctx); 1408 BN_CTX_free(bn_ctx);
1424#endif
1425 EVP_MD_CTX_cleanup(&md_ctx); 1409 EVP_MD_CTX_cleanup(&md_ctx);
1426 return (-1); 1410 return (-1);
1427} 1411}