diff options
| author | jsing <> | 2018-09-06 16:40:45 +0000 |
|---|---|---|
| committer | jsing <> | 2018-09-06 16:40:45 +0000 |
| commit | 39009dce3f2b539a01cfeed40b04f52c37955b4c (patch) | |
| tree | e66e90f0f003a49e386ad0667b3e568deec4c31a /src/lib/libssl/ssl_ciph.c | |
| parent | 5439125a3e68735691ddd4e73d81f9f9b7c2c2ac (diff) | |
| download | openbsd-39009dce3f2b539a01cfeed40b04f52c37955b4c.tar.gz openbsd-39009dce3f2b539a01cfeed40b04f52c37955b4c.tar.bz2 openbsd-39009dce3f2b539a01cfeed40b04f52c37955b4c.zip | |
Drop SSL_CIPHER_ALGORITHM2_AEAD flag.
All of our algorithm_mac == SSL_AEAD cipher suites use EVP_AEAD, so we can
condition on that rather than having a separate redundant flag.
ok tb@
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libssl/ssl_ciph.c | 8 |
1 files changed, 3 insertions, 5 deletions
diff --git a/src/lib/libssl/ssl_ciph.c b/src/lib/libssl/ssl_ciph.c index e429bdeafc..9db0c68ceb 100644 --- a/src/lib/libssl/ssl_ciph.c +++ b/src/lib/libssl/ssl_ciph.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_ciph.c,v 1.102 2018/09/03 18:00:50 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_ciph.c,v 1.103 2018/09/06 16:40:45 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -515,7 +515,7 @@ ssl_cipher_get_evp(const SSL_SESSION *s, const EVP_CIPHER **enc, | |||
| 515 | * This function does not handle EVP_AEAD. | 515 | * This function does not handle EVP_AEAD. |
| 516 | * See ssl_cipher_get_aead_evp instead. | 516 | * See ssl_cipher_get_aead_evp instead. |
| 517 | */ | 517 | */ |
| 518 | if (c->algorithm2 & SSL_CIPHER_ALGORITHM2_AEAD) | 518 | if (c->algorithm_mac & SSL_AEAD) |
| 519 | return(0); | 519 | return(0); |
| 520 | 520 | ||
| 521 | if ((enc == NULL) || (md == NULL)) | 521 | if ((enc == NULL) || (md == NULL)) |
| @@ -593,8 +593,6 @@ ssl_cipher_get_evp(const SSL_SESSION *s, const EVP_CIPHER **enc, | |||
| 593 | *mac_pkey_type = NID_undef; | 593 | *mac_pkey_type = NID_undef; |
| 594 | if (mac_secret_size != NULL) | 594 | if (mac_secret_size != NULL) |
| 595 | *mac_secret_size = 0; | 595 | *mac_secret_size = 0; |
| 596 | if (c->algorithm_mac == SSL_AEAD) | ||
| 597 | mac_pkey_type = NULL; | ||
| 598 | } else { | 596 | } else { |
| 599 | *md = ssl_digest_methods[i]; | 597 | *md = ssl_digest_methods[i]; |
| 600 | if (mac_pkey_type != NULL) | 598 | if (mac_pkey_type != NULL) |
| @@ -624,7 +622,7 @@ ssl_cipher_get_evp_aead(const SSL_SESSION *s, const EVP_AEAD **aead) | |||
| 624 | 622 | ||
| 625 | if (c == NULL) | 623 | if (c == NULL) |
| 626 | return 0; | 624 | return 0; |
| 627 | if ((c->algorithm2 & SSL_CIPHER_ALGORITHM2_AEAD) == 0) | 625 | if ((c->algorithm_mac & SSL_AEAD) == 0) |
| 628 | return 0; | 626 | return 0; |
| 629 | 627 | ||
| 630 | switch (c->algorithm_enc) { | 628 | switch (c->algorithm_enc) { |
