diff options
| author | jsing <> | 2014-07-09 11:25:42 +0000 |
|---|---|---|
| committer | jsing <> | 2014-07-09 11:25:42 +0000 |
| commit | e39ae219007e146f0b9e77030338a5ced6fe0e3c (patch) | |
| tree | 604b9084e9f8d9e522922bc0cd6be5e22478e9ee /src/lib/libssl/s3_clnt.c | |
| parent | dd1dab9e5f2fdf8d0b2b49e9a51011f45aacd959 (diff) | |
| download | openbsd-e39ae219007e146f0b9e77030338a5ced6fe0e3c.tar.gz openbsd-e39ae219007e146f0b9e77030338a5ced6fe0e3c.tar.bz2 openbsd-e39ae219007e146f0b9e77030338a5ced6fe0e3c.zip | |
tedu the SSL export cipher handling - since we do not have enabled export
ciphers we no longer need the flags or code to support it.
ok beck@ miod@
Diffstat (limited to 'src/lib/libssl/s3_clnt.c')
| -rw-r--r-- | src/lib/libssl/s3_clnt.c | 32 |
1 files changed, 1 insertions, 31 deletions
diff --git a/src/lib/libssl/s3_clnt.c b/src/lib/libssl/s3_clnt.c index 0350019078..61de494244 100644 --- a/src/lib/libssl/s3_clnt.c +++ b/src/lib/libssl/s3_clnt.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s3_clnt.c,v 1.72 2014/06/21 20:27:25 tedu Exp $ */ | 1 | /* $OpenBSD: s3_clnt.c,v 1.73 2014/07/09 11:25:42 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1490,14 +1490,6 @@ ssl3_get_key_exchange(SSL *s) | |||
| 1490 | 1490 | ||
| 1491 | group = EC_KEY_get0_group(ecdh); | 1491 | group = EC_KEY_get0_group(ecdh); |
| 1492 | 1492 | ||
| 1493 | if (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) && | ||
| 1494 | (EC_GROUP_get_degree(group) > 163)) { | ||
| 1495 | al = SSL_AD_EXPORT_RESTRICTION; | ||
| 1496 | SSLerr(SSL_F_SSL3_GET_KEY_EXCHANGE, | ||
| 1497 | SSL_R_ECGROUP_TOO_LARGE_FOR_CIPHER); | ||
| 1498 | goto f_err; | ||
| 1499 | } | ||
| 1500 | |||
| 1501 | p += 3; | 1493 | p += 3; |
| 1502 | 1494 | ||
| 1503 | /* Next, get the encoded ECPoint */ | 1495 | /* Next, get the encoded ECPoint */ |
| @@ -2824,28 +2816,6 @@ ssl3_check_cert_and_algorithm(SSL *s) | |||
| 2824 | goto f_err; | 2816 | goto f_err; |
| 2825 | } | 2817 | } |
| 2826 | 2818 | ||
| 2827 | if (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) && | ||
| 2828 | !has_bits(i, EVP_PKT_EXP)) { | ||
| 2829 | if (alg_k & SSL_kRSA) { | ||
| 2830 | if (rsa == NULL || RSA_size(rsa) * 8 > | ||
| 2831 | SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)) { | ||
| 2832 | SSLerr(SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM, | ||
| 2833 | SSL_R_MISSING_EXPORT_TMP_RSA_KEY); | ||
| 2834 | goto f_err; | ||
| 2835 | } | ||
| 2836 | } else if (alg_k & (SSL_kEDH|SSL_kDHr|SSL_kDHd)) { | ||
| 2837 | if (dh == NULL || DH_size(dh) * 8 > | ||
| 2838 | SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)) { | ||
| 2839 | SSLerr(SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM, | ||
| 2840 | SSL_R_MISSING_EXPORT_TMP_DH_KEY); | ||
| 2841 | goto f_err; | ||
| 2842 | } | ||
| 2843 | } else { | ||
| 2844 | SSLerr(SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM, | ||
| 2845 | SSL_R_UNKNOWN_KEY_EXCHANGE_TYPE); | ||
| 2846 | goto f_err; | ||
| 2847 | } | ||
| 2848 | } | ||
| 2849 | return (1); | 2819 | return (1); |
| 2850 | f_err: | 2820 | f_err: |
| 2851 | ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_HANDSHAKE_FAILURE); | 2821 | ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_HANDSHAKE_FAILURE); |
