diff options
author | djm <> | 2009-01-05 21:36:39 +0000 |
---|---|---|
committer | djm <> | 2009-01-05 21:36:39 +0000 |
commit | 13c662ccd1d22d856f1f2defeea26dd18c0af043 (patch) | |
tree | e0d2d687fbd4e4e9eb6bc4b178ea069817f0aba4 /src/lib/libssl/ssl_ciph.c | |
parent | acc5957d1b6d6872ce50e4100edebccea0476481 (diff) | |
download | openbsd-13c662ccd1d22d856f1f2defeea26dd18c0af043.tar.gz openbsd-13c662ccd1d22d856f1f2defeea26dd18c0af043.tar.bz2 openbsd-13c662ccd1d22d856f1f2defeea26dd18c0af043.zip |
update to openssl-0.9.8i; tested by several, especially krw@
Diffstat (limited to 'src/lib/libssl/ssl_ciph.c')
-rw-r--r-- | src/lib/libssl/ssl_ciph.c | 10 |
1 files changed, 10 insertions, 0 deletions
diff --git a/src/lib/libssl/ssl_ciph.c b/src/lib/libssl/ssl_ciph.c index 71b645da14..514292a03e 100644 --- a/src/lib/libssl/ssl_ciph.c +++ b/src/lib/libssl/ssl_ciph.c | |||
@@ -222,6 +222,7 @@ static const SSL_CIPHER cipher_aliases[]={ | |||
222 | {0,SSL_TXT_LOW, 0, 0, SSL_LOW, 0,0,0,0,SSL_STRONG_MASK}, | 222 | {0,SSL_TXT_LOW, 0, 0, SSL_LOW, 0,0,0,0,SSL_STRONG_MASK}, |
223 | {0,SSL_TXT_MEDIUM,0, 0,SSL_MEDIUM, 0,0,0,0,SSL_STRONG_MASK}, | 223 | {0,SSL_TXT_MEDIUM,0, 0,SSL_MEDIUM, 0,0,0,0,SSL_STRONG_MASK}, |
224 | {0,SSL_TXT_HIGH, 0, 0, SSL_HIGH, 0,0,0,0,SSL_STRONG_MASK}, | 224 | {0,SSL_TXT_HIGH, 0, 0, SSL_HIGH, 0,0,0,0,SSL_STRONG_MASK}, |
225 | {0,SSL_TXT_FIPS, 0, 0, SSL_FIPS, 0,0,0,0,SSL_FIPS|SSL_STRONG_NONE}, | ||
225 | }; | 226 | }; |
226 | 227 | ||
227 | void ssl_load_ciphers(void) | 228 | void ssl_load_ciphers(void) |
@@ -515,7 +516,12 @@ static void ssl_cipher_collect_ciphers(const SSL_METHOD *ssl_method, | |||
515 | c = ssl_method->get_cipher(i); | 516 | c = ssl_method->get_cipher(i); |
516 | #define IS_MASKED(c) ((c)->algorithms & (((c)->alg_bits == 256) ? m256 : mask)) | 517 | #define IS_MASKED(c) ((c)->algorithms & (((c)->alg_bits == 256) ? m256 : mask)) |
517 | /* drop those that use any of that is not available */ | 518 | /* drop those that use any of that is not available */ |
519 | #ifdef OPENSSL_FIPS | ||
520 | if ((c != NULL) && c->valid && !IS_MASKED(c) | ||
521 | && (!FIPS_mode() || (c->algo_strength & SSL_FIPS))) | ||
522 | #else | ||
518 | if ((c != NULL) && c->valid && !IS_MASKED(c)) | 523 | if ((c != NULL) && c->valid && !IS_MASKED(c)) |
524 | #endif | ||
519 | { | 525 | { |
520 | co_list[co_list_num].cipher = c; | 526 | co_list[co_list_num].cipher = c; |
521 | co_list[co_list_num].next = NULL; | 527 | co_list[co_list_num].next = NULL; |
@@ -1054,7 +1060,11 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_list(const SSL_METHOD *ssl_method, | |||
1054 | */ | 1060 | */ |
1055 | for (curr = head; curr != NULL; curr = curr->next) | 1061 | for (curr = head; curr != NULL; curr = curr->next) |
1056 | { | 1062 | { |
1063 | #ifdef OPENSSL_FIPS | ||
1064 | if (curr->active && (!FIPS_mode() || curr->cipher->algo_strength & SSL_FIPS)) | ||
1065 | #else | ||
1057 | if (curr->active) | 1066 | if (curr->active) |
1067 | #endif | ||
1058 | { | 1068 | { |
1059 | sk_SSL_CIPHER_push(cipherstack, curr->cipher); | 1069 | sk_SSL_CIPHER_push(cipherstack, curr->cipher); |
1060 | #ifdef CIPHER_DEBUG | 1070 | #ifdef CIPHER_DEBUG |