summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl_srvr.c
diff options
context:
space:
mode:
authorjsing <>2020-05-19 16:35:21 +0000
committerjsing <>2020-05-19 16:35:21 +0000
commit6019fdeeec36b84a28e360616bf851bbb984af8c (patch)
tree5ff7e57b9c4172ec2feea5a8c0a76ee21339a4af /src/lib/libssl/ssl_srvr.c
parent301bb2dc3c4393a25056c7a1ec7b1d4a5efe6ea2 (diff)
downloadopenbsd-6019fdeeec36b84a28e360616bf851bbb984af8c.tar.gz
openbsd-6019fdeeec36b84a28e360616bf851bbb984af8c.tar.bz2
openbsd-6019fdeeec36b84a28e360616bf851bbb984af8c.zip
Replace SSL_PKEY_RSA_ENC/SSL_PKEY_RSA_SIGN with SSL_PKEY_RSA.
Some time prior to SSLeay 0.8.1b, SSL_PKEY_RSA_SIGN got added with the intention of handling RSA sign only certificates... this incomplete code had the following comment: /* check to see if this is a signing only certificate */ /* EAY EAY EAY EAY */ And while the comment was removed in 2005, the incomplete RSA sign-only handling has remained ever since. Remove SSL_PKEY_RSA_SIGN and rename SSL_PKEY_RSA_ENC to SSL_PKEY_RSA. While here also remove the unused SSL_PKEY_DH_RSA. ok tb@
Diffstat (limited to 'src/lib/libssl/ssl_srvr.c')
-rw-r--r--src/lib/libssl/ssl_srvr.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/lib/libssl/ssl_srvr.c b/src/lib/libssl/ssl_srvr.c
index e78099cdad..6a90ad17eb 100644
--- a/src/lib/libssl/ssl_srvr.c
+++ b/src/lib/libssl/ssl_srvr.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_srvr.c,v 1.75 2020/05/10 14:17:48 jsing Exp $ */ 1/* $OpenBSD: ssl_srvr.c,v 1.76 2020/05/19 16:35:20 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -1693,7 +1693,7 @@ ssl3_get_client_kex_rsa(SSL *s, CBS *cbs)
1693 fakekey[0] = s->client_version >> 8; 1693 fakekey[0] = s->client_version >> 8;
1694 fakekey[1] = s->client_version & 0xff; 1694 fakekey[1] = s->client_version & 0xff;
1695 1695
1696 pkey = s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey; 1696 pkey = s->cert->pkeys[SSL_PKEY_RSA].privatekey;
1697 if ((pkey == NULL) || (pkey->type != EVP_PKEY_RSA) || 1697 if ((pkey == NULL) || (pkey->type != EVP_PKEY_RSA) ||
1698 (pkey->pkey.rsa == NULL)) { 1698 (pkey->pkey.rsa == NULL)) {
1699 al = SSL_AD_HANDSHAKE_FAILURE; 1699 al = SSL_AD_HANDSHAKE_FAILURE;