summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_lib.c
diff options
context:
space:
mode:
authorbeck <>2014-07-11 09:24:44 +0000
committerbeck <>2014-07-11 09:24:44 +0000
commit0ca5011d0600da1f218404c4541317bad356f8f1 (patch)
treefc72650b10ed2f0609c79c34b5d36f8e132e4aa1 /src/lib/libssl/s3_lib.c
parent4b550e7e97a6068d5f18fbfc47b22d8b4faa4ff6 (diff)
downloadopenbsd-0ca5011d0600da1f218404c4541317bad356f8f1.tar.gz
openbsd-0ca5011d0600da1f218404c4541317bad356f8f1.tar.bz2
openbsd-0ca5011d0600da1f218404c4541317bad356f8f1.zip
Remove the PSK code. We don't need to drag around this
baggage. ok miod@ jsing@
Diffstat (limited to 'src/lib/libssl/s3_lib.c')
-rw-r--r--src/lib/libssl/s3_lib.c72
1 files changed, 1 insertions, 71 deletions
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c
index 400c1b87e0..f94e207fc4 100644
--- a/src/lib/libssl/s3_lib.c
+++ b/src/lib/libssl/s3_lib.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: s3_lib.c,v 1.68 2014/07/10 08:51:14 tedu Exp $ */ 1/* $OpenBSD: s3_lib.c,v 1.69 2014/07/11 09:24:44 beck Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -1262,71 +1262,6 @@ SSL_CIPHER ssl3_ciphers[] = {
1262 }, 1262 },
1263#endif /* OPENSSL_NO_CAMELLIA */ 1263#endif /* OPENSSL_NO_CAMELLIA */
1264 1264
1265#ifndef OPENSSL_NO_PSK
1266 /* Cipher 8A */
1267 {
1268 .valid = 1,
1269 .name = TLS1_TXT_PSK_WITH_RC4_128_SHA,
1270 .id = TLS1_CK_PSK_WITH_RC4_128_SHA,
1271 .algorithm_mkey = SSL_kPSK,
1272 .algorithm_auth = SSL_aPSK,
1273 .algorithm_enc = SSL_RC4,
1274 .algorithm_mac = SSL_SHA1,
1275 .algorithm_ssl = SSL_TLSV1,
1276 .algo_strength = SSL_MEDIUM,
1277 .algorithm2 = SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF,
1278 .strength_bits = 128,
1279 .alg_bits = 128,
1280 },
1281
1282 /* Cipher 8B */
1283 {
1284 .valid = 1,
1285 .name = TLS1_TXT_PSK_WITH_3DES_EDE_CBC_SHA,
1286 .id = TLS1_CK_PSK_WITH_3DES_EDE_CBC_SHA,
1287 .algorithm_mkey = SSL_kPSK,
1288 .algorithm_auth = SSL_aPSK,
1289 .algorithm_enc = SSL_3DES,
1290 .algorithm_mac = SSL_SHA1,
1291 .algorithm_ssl = SSL_TLSV1,
1292 .algo_strength = SSL_HIGH,
1293 .algorithm2 = SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF,
1294 .strength_bits = 112,
1295 .alg_bits = 168,
1296 },
1297
1298 /* Cipher 8C */
1299 {
1300 .valid = 1,
1301 .name = TLS1_TXT_PSK_WITH_AES_128_CBC_SHA,
1302 .id = TLS1_CK_PSK_WITH_AES_128_CBC_SHA,
1303 .algorithm_mkey = SSL_kPSK,
1304 .algorithm_auth = SSL_aPSK,
1305 .algorithm_enc = SSL_AES128,
1306 .algorithm_mac = SSL_SHA1,
1307 .algorithm_ssl = SSL_TLSV1,
1308 .algo_strength = SSL_HIGH,
1309 .algorithm2 = SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF,
1310 .strength_bits = 128,
1311 .alg_bits = 128,
1312 },
1313
1314 /* Cipher 8D */
1315 {
1316 .valid = 1,
1317 .name = TLS1_TXT_PSK_WITH_AES_256_CBC_SHA,
1318 .id = TLS1_CK_PSK_WITH_AES_256_CBC_SHA,
1319 .algorithm_mkey = SSL_kPSK,
1320 .algorithm_auth = SSL_aPSK,
1321 .algorithm_enc = SSL_AES256,
1322 .algorithm_mac = SSL_SHA1,
1323 .algorithm_ssl = SSL_TLSV1,
1324 .algo_strength = SSL_HIGH,
1325 .algorithm2 = SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF,
1326 .strength_bits = 256,
1327 .alg_bits = 256,
1328 },
1329#endif /* OPENSSL_NO_PSK */
1330 1265
1331 /* GCM ciphersuites from RFC5288 */ 1266 /* GCM ciphersuites from RFC5288 */
1332 1267
@@ -3030,11 +2965,6 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,
3030 alg_k = c->algorithm_mkey; 2965 alg_k = c->algorithm_mkey;
3031 alg_a = c->algorithm_auth; 2966 alg_a = c->algorithm_auth;
3032 2967
3033#ifndef OPENSSL_NO_PSK
3034 /* with PSK there must be server callback set */
3035 if ((alg_k & SSL_kPSK) && s->psk_server_callback == NULL)
3036 continue;
3037#endif /* OPENSSL_NO_PSK */
3038 2968
3039 ok = (alg_k & mask_k) && (alg_a & mask_a); 2969 ok = (alg_k & mask_k) && (alg_a & mask_a);
3040 2970