diff options
author | tedu <> | 2014-05-05 15:03:22 +0000 |
---|---|---|
committer | tedu <> | 2014-05-05 15:03:22 +0000 |
commit | 5b4326f23352be2e7084f2020795d8aa042c746f (patch) | |
tree | c342d9903092a19dfda173837629fd04c429eda9 /src/lib/libssl/ssl_lib.c | |
parent | 77dd1ca11ad22b323b27beea447edd1e35c3b24e (diff) | |
download | openbsd-5b4326f23352be2e7084f2020795d8aa042c746f.tar.gz openbsd-5b4326f23352be2e7084f2020795d8aa042c746f.tar.bz2 openbsd-5b4326f23352be2e7084f2020795d8aa042c746f.zip |
Remove SRP and Kerberos support from libssl. These are complex protocols
all on their own and we can't effectively maintain them without using them,
which we don't. If the need arises, the code can be resurrected.
Diffstat (limited to 'src/lib/libssl/ssl_lib.c')
-rw-r--r-- | src/lib/libssl/ssl_lib.c | 27 |
1 files changed, 0 insertions, 27 deletions
diff --git a/src/lib/libssl/ssl_lib.c b/src/lib/libssl/ssl_lib.c index 195271a554..d046480feb 100644 --- a/src/lib/libssl/ssl_lib.c +++ b/src/lib/libssl/ssl_lib.c | |||
@@ -284,9 +284,6 @@ SSL_new(SSL_CTX *ctx) | |||
284 | if (s == NULL) | 284 | if (s == NULL) |
285 | goto err; | 285 | goto err; |
286 | 286 | ||
287 | #ifndef OPENSSL_NO_KRB5 | ||
288 | s->kssl_ctx = kssl_ctx_new(); | ||
289 | #endif /* OPENSSL_NO_KRB5 */ | ||
290 | 287 | ||
291 | s->options = ctx->options; | 288 | s->options = ctx->options; |
292 | s->mode = ctx->mode; | 289 | s->mode = ctx->mode; |
@@ -580,10 +577,6 @@ SSL_free(SSL *s) | |||
580 | if (s->ctx) | 577 | if (s->ctx) |
581 | SSL_CTX_free(s->ctx); | 578 | SSL_CTX_free(s->ctx); |
582 | 579 | ||
583 | #ifndef OPENSSL_NO_KRB5 | ||
584 | if (s->kssl_ctx != NULL) | ||
585 | kssl_ctx_free(s->kssl_ctx); | ||
586 | #endif /* OPENSSL_NO_KRB5 */ | ||
587 | 580 | ||
588 | #if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG) | 581 | #if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG) |
589 | if (s->next_proto_negotiated) | 582 | if (s->next_proto_negotiated) |
@@ -1415,9 +1408,6 @@ ssl_cipher_list_to_bytes(SSL *s, STACK_OF(SSL_CIPHER) *sk, unsigned char *p, | |||
1415 | int i, j = 0; | 1408 | int i, j = 0; |
1416 | SSL_CIPHER *c; | 1409 | SSL_CIPHER *c; |
1417 | unsigned char *q; | 1410 | unsigned char *q; |
1418 | #ifndef OPENSSL_NO_KRB5 | ||
1419 | int nokrb5 = !kssl_tgt_is_available(s->kssl_ctx); | ||
1420 | #endif /* OPENSSL_NO_KRB5 */ | ||
1421 | 1411 | ||
1422 | if (sk == NULL) | 1412 | if (sk == NULL) |
1423 | return (0); | 1413 | return (0); |
@@ -1429,11 +1419,6 @@ ssl_cipher_list_to_bytes(SSL *s, STACK_OF(SSL_CIPHER) *sk, unsigned char *p, | |||
1429 | if ((c->algorithm_ssl & SSL_TLSV1_2) && | 1419 | if ((c->algorithm_ssl & SSL_TLSV1_2) && |
1430 | (TLS1_get_client_version(s) < TLS1_2_VERSION)) | 1420 | (TLS1_get_client_version(s) < TLS1_2_VERSION)) |
1431 | continue; | 1421 | continue; |
1432 | #ifndef OPENSSL_NO_KRB5 | ||
1433 | if (((c->algorithm_mkey & SSL_kKRB5) || | ||
1434 | (c->algorithm_auth & SSL_aKRB5)) && nokrb5) | ||
1435 | continue; | ||
1436 | #endif /* OPENSSL_NO_KRB5 */ | ||
1437 | #ifndef OPENSSL_NO_PSK | 1422 | #ifndef OPENSSL_NO_PSK |
1438 | /* with PSK there must be client callback set */ | 1423 | /* with PSK there must be client callback set */ |
1439 | if (((c->algorithm_mkey & SSL_kPSK) || | 1424 | if (((c->algorithm_mkey & SSL_kPSK) || |
@@ -1877,9 +1862,6 @@ SSL_CTX_new(const SSL_METHOD *meth) | |||
1877 | ret->psk_client_callback = NULL; | 1862 | ret->psk_client_callback = NULL; |
1878 | ret->psk_server_callback = NULL; | 1863 | ret->psk_server_callback = NULL; |
1879 | #endif | 1864 | #endif |
1880 | #ifndef OPENSSL_NO_SRP | ||
1881 | SSL_CTX_SRP_CTX_init(ret); | ||
1882 | #endif | ||
1883 | #ifndef OPENSSL_NO_ENGINE | 1865 | #ifndef OPENSSL_NO_ENGINE |
1884 | ret->client_cert_engine = NULL; | 1866 | ret->client_cert_engine = NULL; |
1885 | #ifdef OPENSSL_SSL_CLIENT_ENGINE_AUTO | 1867 | #ifdef OPENSSL_SSL_CLIENT_ENGINE_AUTO |
@@ -1983,9 +1965,6 @@ SSL_CTX_free(SSL_CTX *a) | |||
1983 | if (a->psk_identity_hint) | 1965 | if (a->psk_identity_hint) |
1984 | free(a->psk_identity_hint); | 1966 | free(a->psk_identity_hint); |
1985 | #endif | 1967 | #endif |
1986 | #ifndef OPENSSL_NO_SRP | ||
1987 | SSL_CTX_SRP_CTX_free(a); | ||
1988 | #endif | ||
1989 | #ifndef OPENSSL_NO_ENGINE | 1968 | #ifndef OPENSSL_NO_ENGINE |
1990 | if (a->client_cert_engine) | 1969 | if (a->client_cert_engine) |
1991 | ENGINE_finish(a->client_cert_engine); | 1970 | ENGINE_finish(a->client_cert_engine); |
@@ -2147,12 +2126,6 @@ ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) | |||
2147 | mask_a|=SSL_aNULL; | 2126 | mask_a|=SSL_aNULL; |
2148 | emask_a|=SSL_aNULL; | 2127 | emask_a|=SSL_aNULL; |
2149 | 2128 | ||
2150 | #ifndef OPENSSL_NO_KRB5 | ||
2151 | mask_k|=SSL_kKRB5; | ||
2152 | mask_a|=SSL_aKRB5; | ||
2153 | emask_k|=SSL_kKRB5; | ||
2154 | emask_a|=SSL_aKRB5; | ||
2155 | #endif | ||
2156 | 2129 | ||
2157 | /* | 2130 | /* |
2158 | * An ECC certificate may be usable for ECDH and/or | 2131 | * An ECC certificate may be usable for ECDH and/or |