diff options
author | jsing <> | 2020-05-19 16:35:21 +0000 |
---|---|---|
committer | jsing <> | 2020-05-19 16:35:21 +0000 |
commit | 6019fdeeec36b84a28e360616bf851bbb984af8c (patch) | |
tree | 5ff7e57b9c4172ec2feea5a8c0a76ee21339a4af /src/lib/libssl/ssl_srvr.c | |
parent | 301bb2dc3c4393a25056c7a1ec7b1d4a5efe6ea2 (diff) | |
download | openbsd-6019fdeeec36b84a28e360616bf851bbb984af8c.tar.gz openbsd-6019fdeeec36b84a28e360616bf851bbb984af8c.tar.bz2 openbsd-6019fdeeec36b84a28e360616bf851bbb984af8c.zip |
Replace SSL_PKEY_RSA_ENC/SSL_PKEY_RSA_SIGN with SSL_PKEY_RSA.
Some time prior to SSLeay 0.8.1b, SSL_PKEY_RSA_SIGN got added with the
intention of handling RSA sign only certificates... this incomplete code
had the following comment:
/* check to see if this is a signing only certificate */
/* EAY EAY EAY EAY */
And while the comment was removed in 2005, the incomplete RSA sign-only
handling has remained ever since.
Remove SSL_PKEY_RSA_SIGN and rename SSL_PKEY_RSA_ENC to SSL_PKEY_RSA. While
here also remove the unused SSL_PKEY_DH_RSA.
ok tb@
Diffstat (limited to 'src/lib/libssl/ssl_srvr.c')
-rw-r--r-- | src/lib/libssl/ssl_srvr.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/lib/libssl/ssl_srvr.c b/src/lib/libssl/ssl_srvr.c index e78099cdad..6a90ad17eb 100644 --- a/src/lib/libssl/ssl_srvr.c +++ b/src/lib/libssl/ssl_srvr.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl_srvr.c,v 1.75 2020/05/10 14:17:48 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_srvr.c,v 1.76 2020/05/19 16:35:20 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -1693,7 +1693,7 @@ ssl3_get_client_kex_rsa(SSL *s, CBS *cbs) | |||
1693 | fakekey[0] = s->client_version >> 8; | 1693 | fakekey[0] = s->client_version >> 8; |
1694 | fakekey[1] = s->client_version & 0xff; | 1694 | fakekey[1] = s->client_version & 0xff; |
1695 | 1695 | ||
1696 | pkey = s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey; | 1696 | pkey = s->cert->pkeys[SSL_PKEY_RSA].privatekey; |
1697 | if ((pkey == NULL) || (pkey->type != EVP_PKEY_RSA) || | 1697 | if ((pkey == NULL) || (pkey->type != EVP_PKEY_RSA) || |
1698 | (pkey->pkey.rsa == NULL)) { | 1698 | (pkey->pkey.rsa == NULL)) { |
1699 | al = SSL_AD_HANDSHAKE_FAILURE; | 1699 | al = SSL_AD_HANDSHAKE_FAILURE; |