diff options
| author | tb <> | 2022-07-02 16:31:04 +0000 |
|---|---|---|
| committer | tb <> | 2022-07-02 16:31:04 +0000 |
| commit | 274f622e186b69a67b9ccd2ebb48918c3a67ad64 (patch) | |
| tree | bc3bde853323758696c370e558e602d43422a86d /src/lib/libssl/ssl_ciphers.c | |
| parent | ef99055644809bf9803db0f1022b2a923a0e3236 (diff) | |
| download | openbsd-274f622e186b69a67b9ccd2ebb48918c3a67ad64.tar.gz openbsd-274f622e186b69a67b9ccd2ebb48918c3a67ad64.tar.bz2 openbsd-274f622e186b69a67b9ccd2ebb48918c3a67ad64.zip | |
Stop using ssl{_ctx,}_security() outside of ssl_seclevel.c
The API is ugly and we can easily abstract it away. The SSL_SECOP_* stuff
is now confined into ssl_seclevel.c and the rest of the library can make
use of the more straightforward wrappers, which makes it a lot easier on
the eyes.
ok beck jsing
Diffstat (limited to 'src/lib/libssl/ssl_ciphers.c')
| -rw-r--r-- | src/lib/libssl/ssl_ciphers.c | 5 |
1 files changed, 2 insertions, 3 deletions
diff --git a/src/lib/libssl/ssl_ciphers.c b/src/lib/libssl/ssl_ciphers.c index 99f23dff4b..f77f32ab7f 100644 --- a/src/lib/libssl/ssl_ciphers.c +++ b/src/lib/libssl/ssl_ciphers.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_ciphers.c,v 1.14 2022/06/29 08:38:01 tb Exp $ */ | 1 | /* $OpenBSD: ssl_ciphers.c,v 1.15 2022/07/02 16:31:04 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2015-2017 Doug Hogan <doug@openbsd.org> | 3 | * Copyright (c) 2015-2017 Doug Hogan <doug@openbsd.org> |
| 4 | * Copyright (c) 2015-2018, 2020 Joel Sing <jsing@openbsd.org> | 4 | * Copyright (c) 2015-2018, 2020 Joel Sing <jsing@openbsd.org> |
| @@ -70,8 +70,7 @@ ssl_cipher_list_to_bytes(SSL *s, STACK_OF(SSL_CIPHER) *ciphers, CBB *cbb) | |||
| 70 | if (!ssl_cipher_allowed_in_tls_version_range(cipher, min_vers, | 70 | if (!ssl_cipher_allowed_in_tls_version_range(cipher, min_vers, |
| 71 | max_vers)) | 71 | max_vers)) |
| 72 | continue; | 72 | continue; |
| 73 | if (!ssl_security(s, SSL_SECOP_CIPHER_CHECK, | 73 | if (!ssl_security_cipher_check(s, cipher)) |
| 74 | cipher->strength_bits, 0, cipher)) | ||
| 75 | continue; | 74 | continue; |
| 76 | if (!CBB_add_u16(cbb, ssl3_cipher_get_value(cipher))) | 75 | if (!CBB_add_u16(cbb, ssl3_cipher_get_value(cipher))) |
| 77 | return 0; | 76 | return 0; |
