summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_lib.c
diff options
context:
space:
mode:
authortedu <>2014-05-05 15:03:22 +0000
committertedu <>2014-05-05 15:03:22 +0000
commit5b4326f23352be2e7084f2020795d8aa042c746f (patch)
treec342d9903092a19dfda173837629fd04c429eda9 /src/lib/libssl/ssl_lib.c
parent77dd1ca11ad22b323b27beea447edd1e35c3b24e (diff)
downloadopenbsd-5b4326f23352be2e7084f2020795d8aa042c746f.tar.gz
openbsd-5b4326f23352be2e7084f2020795d8aa042c746f.tar.bz2
openbsd-5b4326f23352be2e7084f2020795d8aa042c746f.zip
Remove SRP and Kerberos support from libssl. These are complex protocols
all on their own and we can't effectively maintain them without using them, which we don't. If the need arises, the code can be resurrected.
Diffstat (limited to 'src/lib/libssl/ssl_lib.c')
-rw-r--r--src/lib/libssl/ssl_lib.c27
1 files changed, 0 insertions, 27 deletions
diff --git a/src/lib/libssl/ssl_lib.c b/src/lib/libssl/ssl_lib.c
index 195271a554..d046480feb 100644
--- a/src/lib/libssl/ssl_lib.c
+++ b/src/lib/libssl/ssl_lib.c
@@ -284,9 +284,6 @@ SSL_new(SSL_CTX *ctx)
284 if (s == NULL) 284 if (s == NULL)
285 goto err; 285 goto err;
286 286
287#ifndef OPENSSL_NO_KRB5
288 s->kssl_ctx = kssl_ctx_new();
289#endif /* OPENSSL_NO_KRB5 */
290 287
291 s->options = ctx->options; 288 s->options = ctx->options;
292 s->mode = ctx->mode; 289 s->mode = ctx->mode;
@@ -580,10 +577,6 @@ SSL_free(SSL *s)
580 if (s->ctx) 577 if (s->ctx)
581 SSL_CTX_free(s->ctx); 578 SSL_CTX_free(s->ctx);
582 579
583#ifndef OPENSSL_NO_KRB5
584 if (s->kssl_ctx != NULL)
585 kssl_ctx_free(s->kssl_ctx);
586#endif /* OPENSSL_NO_KRB5 */
587 580
588#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG) 581#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
589 if (s->next_proto_negotiated) 582 if (s->next_proto_negotiated)
@@ -1415,9 +1408,6 @@ ssl_cipher_list_to_bytes(SSL *s, STACK_OF(SSL_CIPHER) *sk, unsigned char *p,
1415 int i, j = 0; 1408 int i, j = 0;
1416 SSL_CIPHER *c; 1409 SSL_CIPHER *c;
1417 unsigned char *q; 1410 unsigned char *q;
1418#ifndef OPENSSL_NO_KRB5
1419 int nokrb5 = !kssl_tgt_is_available(s->kssl_ctx);
1420#endif /* OPENSSL_NO_KRB5 */
1421 1411
1422 if (sk == NULL) 1412 if (sk == NULL)
1423 return (0); 1413 return (0);
@@ -1429,11 +1419,6 @@ ssl_cipher_list_to_bytes(SSL *s, STACK_OF(SSL_CIPHER) *sk, unsigned char *p,
1429 if ((c->algorithm_ssl & SSL_TLSV1_2) && 1419 if ((c->algorithm_ssl & SSL_TLSV1_2) &&
1430 (TLS1_get_client_version(s) < TLS1_2_VERSION)) 1420 (TLS1_get_client_version(s) < TLS1_2_VERSION))
1431 continue; 1421 continue;
1432#ifndef OPENSSL_NO_KRB5
1433 if (((c->algorithm_mkey & SSL_kKRB5) ||
1434 (c->algorithm_auth & SSL_aKRB5)) && nokrb5)
1435 continue;
1436#endif /* OPENSSL_NO_KRB5 */
1437#ifndef OPENSSL_NO_PSK 1422#ifndef OPENSSL_NO_PSK
1438 /* with PSK there must be client callback set */ 1423 /* with PSK there must be client callback set */
1439 if (((c->algorithm_mkey & SSL_kPSK) || 1424 if (((c->algorithm_mkey & SSL_kPSK) ||
@@ -1877,9 +1862,6 @@ SSL_CTX_new(const SSL_METHOD *meth)
1877 ret->psk_client_callback = NULL; 1862 ret->psk_client_callback = NULL;
1878 ret->psk_server_callback = NULL; 1863 ret->psk_server_callback = NULL;
1879#endif 1864#endif
1880#ifndef OPENSSL_NO_SRP
1881 SSL_CTX_SRP_CTX_init(ret);
1882#endif
1883#ifndef OPENSSL_NO_ENGINE 1865#ifndef OPENSSL_NO_ENGINE
1884 ret->client_cert_engine = NULL; 1866 ret->client_cert_engine = NULL;
1885#ifdef OPENSSL_SSL_CLIENT_ENGINE_AUTO 1867#ifdef OPENSSL_SSL_CLIENT_ENGINE_AUTO
@@ -1983,9 +1965,6 @@ SSL_CTX_free(SSL_CTX *a)
1983 if (a->psk_identity_hint) 1965 if (a->psk_identity_hint)
1984 free(a->psk_identity_hint); 1966 free(a->psk_identity_hint);
1985#endif 1967#endif
1986#ifndef OPENSSL_NO_SRP
1987 SSL_CTX_SRP_CTX_free(a);
1988#endif
1989#ifndef OPENSSL_NO_ENGINE 1968#ifndef OPENSSL_NO_ENGINE
1990 if (a->client_cert_engine) 1969 if (a->client_cert_engine)
1991 ENGINE_finish(a->client_cert_engine); 1970 ENGINE_finish(a->client_cert_engine);
@@ -2147,12 +2126,6 @@ ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher)
2147 mask_a|=SSL_aNULL; 2126 mask_a|=SSL_aNULL;
2148 emask_a|=SSL_aNULL; 2127 emask_a|=SSL_aNULL;
2149 2128
2150#ifndef OPENSSL_NO_KRB5
2151 mask_k|=SSL_kKRB5;
2152 mask_a|=SSL_aKRB5;
2153 emask_k|=SSL_kKRB5;
2154 emask_a|=SSL_aKRB5;
2155#endif
2156 2129
2157 /* 2130 /*
2158 * An ECC certificate may be usable for ECDH and/or 2131 * An ECC certificate may be usable for ECDH and/or