summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_srvr.c
diff options
context:
space:
mode:
authorjsing <>2014-05-25 16:23:10 +0000
committerjsing <>2014-05-25 16:23:10 +0000
commit20aefbf0b86724bbf87cb9ceb36defa64e4691ab (patch)
tree3f1db49f0679d8ac712ededb86f1b538423eea91 /src/lib/libssl/s3_srvr.c
parent23deca1ca2f60559c720fd71c5ac72fb2c862771 (diff)
downloadopenbsd-20aefbf0b86724bbf87cb9ceb36defa64e4691ab.tar.gz
openbsd-20aefbf0b86724bbf87cb9ceb36defa64e4691ab.tar.bz2
openbsd-20aefbf0b86724bbf87cb9ceb36defa64e4691ab.zip
Remove TLS_DEBUG, SSL_DEBUG, CIPHER_DEBUG and OPENSSL_RI_DEBUG. Much of
this is sporadic, hacked up and can easily be put back in an improved form should we ever need it. ok miod@
Diffstat (limited to 'src/lib/libssl/s3_srvr.c')
-rw-r--r--src/lib/libssl/s3_srvr.c19
1 files changed, 0 insertions, 19 deletions
diff --git a/src/lib/libssl/s3_srvr.c b/src/lib/libssl/s3_srvr.c
index 6f788cd080..521f6a21e8 100644
--- a/src/lib/libssl/s3_srvr.c
+++ b/src/lib/libssl/s3_srvr.c
@@ -1088,15 +1088,8 @@ ssl3_get_client_hello(SSL *s)
1088 j = 0; 1088 j = 0;
1089 id = s->session->cipher->id; 1089 id = s->session->cipher->id;
1090 1090
1091#ifdef CIPHER_DEBUG
1092 printf("client sent %d ciphers\n", sk_num(ciphers));
1093#endif
1094 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { 1091 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) {
1095 c = sk_SSL_CIPHER_value(ciphers, i); 1092 c = sk_SSL_CIPHER_value(ciphers, i);
1096#ifdef CIPHER_DEBUG
1097 printf("client [%2d of %2d]:%s\n",
1098 i, sk_num(ciphers), SSL_CIPHER_get_name(c));
1099#endif
1100 if (c->id == id) { 1093 if (c->id == id) {
1101 j = 1; 1094 j = 1;
1102 break; 1095 break;
@@ -1890,10 +1883,6 @@ ssl3_send_server_key_exchange(SSL *s)
1890 } 1883 }
1891 p += 2; 1884 p += 2;
1892 } 1885 }
1893#ifdef SSL_DEBUG
1894 fprintf(stderr, "Using hash %s\n",
1895 EVP_MD_name(md));
1896#endif
1897 EVP_SignInit_ex(&md_ctx, md, NULL); 1886 EVP_SignInit_ex(&md_ctx, md, NULL);
1898 EVP_SignUpdate(&md_ctx, 1887 EVP_SignUpdate(&md_ctx,
1899 &(s->s3->client_random[0]), 1888 &(s->s3->client_random[0]),
@@ -2662,10 +2651,6 @@ ssl3_get_cert_verify(SSL *s)
2662 al = SSL_AD_DECODE_ERROR; 2651 al = SSL_AD_DECODE_ERROR;
2663 goto f_err; 2652 goto f_err;
2664 } 2653 }
2665#ifdef SSL_DEBUG
2666 fprintf(stderr, "USING TLSv1.2 HASH %s\n",
2667 EVP_MD_name(md));
2668#endif
2669 p += 2; 2654 p += 2;
2670 n -= 2; 2655 n -= 2;
2671 } 2656 }
@@ -2696,10 +2681,6 @@ ssl3_get_cert_verify(SSL *s)
2696 al = SSL_AD_INTERNAL_ERROR; 2681 al = SSL_AD_INTERNAL_ERROR;
2697 goto f_err; 2682 goto f_err;
2698 } 2683 }
2699#ifdef SSL_DEBUG
2700 fprintf(stderr, "Using TLS 1.2 with client verify alg %s\n",
2701 EVP_MD_name(md));
2702#endif
2703 if (!EVP_VerifyInit_ex(&mctx, md, NULL) || 2684 if (!EVP_VerifyInit_ex(&mctx, md, NULL) ||
2704 !EVP_VerifyUpdate(&mctx, hdata, hdatalen)) { 2685 !EVP_VerifyUpdate(&mctx, hdata, hdatalen)) {
2705 SSLerr(SSL_F_SSL3_GET_CERT_VERIFY, 2686 SSLerr(SSL_F_SSL3_GET_CERT_VERIFY,