summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_clnt.c
diff options
context:
space:
mode:
authorjsing <>2014-07-09 11:25:42 +0000
committerjsing <>2014-07-09 11:25:42 +0000
commitc90a1a4bb021e5a2622323df8464bf574d0c4364 (patch)
tree604b9084e9f8d9e522922bc0cd6be5e22478e9ee /src/lib/libssl/s3_clnt.c
parent4afcbff6153d561348af47fa000f298df3693a3c (diff)
downloadopenbsd-c90a1a4bb021e5a2622323df8464bf574d0c4364.tar.gz
openbsd-c90a1a4bb021e5a2622323df8464bf574d0c4364.tar.bz2
openbsd-c90a1a4bb021e5a2622323df8464bf574d0c4364.zip
tedu the SSL export cipher handling - since we do not have enabled export
ciphers we no longer need the flags or code to support it. ok beck@ miod@
Diffstat (limited to 'src/lib/libssl/s3_clnt.c')
-rw-r--r--src/lib/libssl/s3_clnt.c32
1 files changed, 1 insertions, 31 deletions
diff --git a/src/lib/libssl/s3_clnt.c b/src/lib/libssl/s3_clnt.c
index 0350019078..61de494244 100644
--- a/src/lib/libssl/s3_clnt.c
+++ b/src/lib/libssl/s3_clnt.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: s3_clnt.c,v 1.72 2014/06/21 20:27:25 tedu Exp $ */ 1/* $OpenBSD: s3_clnt.c,v 1.73 2014/07/09 11:25:42 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -1490,14 +1490,6 @@ ssl3_get_key_exchange(SSL *s)
1490 1490
1491 group = EC_KEY_get0_group(ecdh); 1491 group = EC_KEY_get0_group(ecdh);
1492 1492
1493 if (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) &&
1494 (EC_GROUP_get_degree(group) > 163)) {
1495 al = SSL_AD_EXPORT_RESTRICTION;
1496 SSLerr(SSL_F_SSL3_GET_KEY_EXCHANGE,
1497 SSL_R_ECGROUP_TOO_LARGE_FOR_CIPHER);
1498 goto f_err;
1499 }
1500
1501 p += 3; 1493 p += 3;
1502 1494
1503 /* Next, get the encoded ECPoint */ 1495 /* Next, get the encoded ECPoint */
@@ -2824,28 +2816,6 @@ ssl3_check_cert_and_algorithm(SSL *s)
2824 goto f_err; 2816 goto f_err;
2825 } 2817 }
2826 2818
2827 if (SSL_C_IS_EXPORT(s->s3->tmp.new_cipher) &&
2828 !has_bits(i, EVP_PKT_EXP)) {
2829 if (alg_k & SSL_kRSA) {
2830 if (rsa == NULL || RSA_size(rsa) * 8 >
2831 SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)) {
2832 SSLerr(SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM,
2833 SSL_R_MISSING_EXPORT_TMP_RSA_KEY);
2834 goto f_err;
2835 }
2836 } else if (alg_k & (SSL_kEDH|SSL_kDHr|SSL_kDHd)) {
2837 if (dh == NULL || DH_size(dh) * 8 >
2838 SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher)) {
2839 SSLerr(SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM,
2840 SSL_R_MISSING_EXPORT_TMP_DH_KEY);
2841 goto f_err;
2842 }
2843 } else {
2844 SSLerr(SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM,
2845 SSL_R_UNKNOWN_KEY_EXCHANGE_TYPE);
2846 goto f_err;
2847 }
2848 }
2849 return (1); 2819 return (1);
2850f_err: 2820f_err:
2851 ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_HANDSHAKE_FAILURE); 2821 ssl3_send_alert(s, SSL3_AL_FATAL, SSL_AD_HANDSHAKE_FAILURE);