diff options
author | jsing <> | 2014-05-25 16:23:10 +0000 |
---|---|---|
committer | jsing <> | 2014-05-25 16:23:10 +0000 |
commit | 20aefbf0b86724bbf87cb9ceb36defa64e4691ab (patch) | |
tree | 3f1db49f0679d8ac712ededb86f1b538423eea91 /src/lib/libssl/s3_srvr.c | |
parent | 23deca1ca2f60559c720fd71c5ac72fb2c862771 (diff) | |
download | openbsd-20aefbf0b86724bbf87cb9ceb36defa64e4691ab.tar.gz openbsd-20aefbf0b86724bbf87cb9ceb36defa64e4691ab.tar.bz2 openbsd-20aefbf0b86724bbf87cb9ceb36defa64e4691ab.zip |
Remove TLS_DEBUG, SSL_DEBUG, CIPHER_DEBUG and OPENSSL_RI_DEBUG. Much of
this is sporadic, hacked up and can easily be put back in an improved form
should we ever need it.
ok miod@
Diffstat (limited to 'src/lib/libssl/s3_srvr.c')
-rw-r--r-- | src/lib/libssl/s3_srvr.c | 19 |
1 files changed, 0 insertions, 19 deletions
diff --git a/src/lib/libssl/s3_srvr.c b/src/lib/libssl/s3_srvr.c index 6f788cd080..521f6a21e8 100644 --- a/src/lib/libssl/s3_srvr.c +++ b/src/lib/libssl/s3_srvr.c | |||
@@ -1088,15 +1088,8 @@ ssl3_get_client_hello(SSL *s) | |||
1088 | j = 0; | 1088 | j = 0; |
1089 | id = s->session->cipher->id; | 1089 | id = s->session->cipher->id; |
1090 | 1090 | ||
1091 | #ifdef CIPHER_DEBUG | ||
1092 | printf("client sent %d ciphers\n", sk_num(ciphers)); | ||
1093 | #endif | ||
1094 | for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { | 1091 | for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { |
1095 | c = sk_SSL_CIPHER_value(ciphers, i); | 1092 | c = sk_SSL_CIPHER_value(ciphers, i); |
1096 | #ifdef CIPHER_DEBUG | ||
1097 | printf("client [%2d of %2d]:%s\n", | ||
1098 | i, sk_num(ciphers), SSL_CIPHER_get_name(c)); | ||
1099 | #endif | ||
1100 | if (c->id == id) { | 1093 | if (c->id == id) { |
1101 | j = 1; | 1094 | j = 1; |
1102 | break; | 1095 | break; |
@@ -1890,10 +1883,6 @@ ssl3_send_server_key_exchange(SSL *s) | |||
1890 | } | 1883 | } |
1891 | p += 2; | 1884 | p += 2; |
1892 | } | 1885 | } |
1893 | #ifdef SSL_DEBUG | ||
1894 | fprintf(stderr, "Using hash %s\n", | ||
1895 | EVP_MD_name(md)); | ||
1896 | #endif | ||
1897 | EVP_SignInit_ex(&md_ctx, md, NULL); | 1886 | EVP_SignInit_ex(&md_ctx, md, NULL); |
1898 | EVP_SignUpdate(&md_ctx, | 1887 | EVP_SignUpdate(&md_ctx, |
1899 | &(s->s3->client_random[0]), | 1888 | &(s->s3->client_random[0]), |
@@ -2662,10 +2651,6 @@ ssl3_get_cert_verify(SSL *s) | |||
2662 | al = SSL_AD_DECODE_ERROR; | 2651 | al = SSL_AD_DECODE_ERROR; |
2663 | goto f_err; | 2652 | goto f_err; |
2664 | } | 2653 | } |
2665 | #ifdef SSL_DEBUG | ||
2666 | fprintf(stderr, "USING TLSv1.2 HASH %s\n", | ||
2667 | EVP_MD_name(md)); | ||
2668 | #endif | ||
2669 | p += 2; | 2654 | p += 2; |
2670 | n -= 2; | 2655 | n -= 2; |
2671 | } | 2656 | } |
@@ -2696,10 +2681,6 @@ ssl3_get_cert_verify(SSL *s) | |||
2696 | al = SSL_AD_INTERNAL_ERROR; | 2681 | al = SSL_AD_INTERNAL_ERROR; |
2697 | goto f_err; | 2682 | goto f_err; |
2698 | } | 2683 | } |
2699 | #ifdef SSL_DEBUG | ||
2700 | fprintf(stderr, "Using TLS 1.2 with client verify alg %s\n", | ||
2701 | EVP_MD_name(md)); | ||
2702 | #endif | ||
2703 | if (!EVP_VerifyInit_ex(&mctx, md, NULL) || | 2684 | if (!EVP_VerifyInit_ex(&mctx, md, NULL) || |
2704 | !EVP_VerifyUpdate(&mctx, hdata, hdatalen)) { | 2685 | !EVP_VerifyUpdate(&mctx, hdata, hdatalen)) { |
2705 | SSLerr(SSL_F_SSL3_GET_CERT_VERIFY, | 2686 | SSLerr(SSL_F_SSL3_GET_CERT_VERIFY, |