summaryrefslogtreecommitdiff
path: root/src/lib/libssl/t1_enc.c
diff options
context:
space:
mode:
authorjsing <>2014-05-25 16:23:10 +0000
committerjsing <>2014-05-25 16:23:10 +0000
commit20aefbf0b86724bbf87cb9ceb36defa64e4691ab (patch)
tree3f1db49f0679d8ac712ededb86f1b538423eea91 /src/lib/libssl/t1_enc.c
parent23deca1ca2f60559c720fd71c5ac72fb2c862771 (diff)
downloadopenbsd-20aefbf0b86724bbf87cb9ceb36defa64e4691ab.tar.gz
openbsd-20aefbf0b86724bbf87cb9ceb36defa64e4691ab.tar.bz2
openbsd-20aefbf0b86724bbf87cb9ceb36defa64e4691ab.zip
Remove TLS_DEBUG, SSL_DEBUG, CIPHER_DEBUG and OPENSSL_RI_DEBUG. Much of
this is sporadic, hacked up and can easily be put back in an improved form should we ever need it. ok miod@
Diffstat (limited to 'src/lib/libssl/t1_enc.c')
-rw-r--r--src/lib/libssl/t1_enc.c46
1 files changed, 0 insertions, 46 deletions
diff --git a/src/lib/libssl/t1_enc.c b/src/lib/libssl/t1_enc.c
index 5f17a4a94a..a9be8bdb4c 100644
--- a/src/lib/libssl/t1_enc.c
+++ b/src/lib/libssl/t1_enc.c
@@ -458,10 +458,6 @@ tls1_change_cipher_state(SSL *s, int which)
458 EVP_DigestSignInit(mac_ctx, NULL, m, NULL, mac_key); 458 EVP_DigestSignInit(mac_ctx, NULL, m, NULL, mac_key);
459 EVP_PKEY_free(mac_key); 459 EVP_PKEY_free(mac_key);
460 } 460 }
461#ifdef TLS_DEBUG
462 printf("which = %04X\nmac key=", which);
463 { int z; for (z = 0; z<i; z++) printf("%02X%c", ms[z],((z+1)%16)?' ':'\n'); }
464#endif
465 if (is_export) { 461 if (is_export) {
466 /* In here I set both the read and write key/iv to the 462 /* In here I set both the read and write key/iv to the
467 * same value since only the correct one will be used :-). 463 * same value since only the correct one will be used :-).
@@ -501,13 +497,6 @@ tls1_change_cipher_state(SSL *s, int which)
501 EVP_CIPHER_CTX_ctrl(dd, EVP_CTRL_AEAD_SET_MAC_KEY, 497 EVP_CIPHER_CTX_ctrl(dd, EVP_CTRL_AEAD_SET_MAC_KEY,
502 *mac_secret_size, mac_secret); 498 *mac_secret_size, mac_secret);
503 499
504#ifdef TLS_DEBUG
505 printf("which = %04X\nkey=", which);
506 { int z; for (z = 0; z<EVP_CIPHER_key_length(c); z++) printf("%02X%c", key[z],((z+1)%16)?' ':'\n'); }
507 printf("\niv=");
508 { int z; for (z = 0; z<k; z++) printf("%02X%c", iv[z],((z+1)%16)?' ':'\n'); }
509 printf("\n");
510#endif
511 500
512 OPENSSL_cleanse(tmp1, sizeof(tmp1)); 501 OPENSSL_cleanse(tmp1, sizeof(tmp1));
513 OPENSSL_cleanse(tmp2, sizeof(tmp2)); 502 OPENSSL_cleanse(tmp2, sizeof(tmp2));
@@ -570,20 +559,8 @@ tls1_setup_key_block(SSL *s)
570 goto err; 559 goto err;
571 } 560 }
572 561
573#ifdef TLS_DEBUG
574 printf("client random\n");
575 { int z; for (z = 0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c", s->s3->client_random[z],((z+1)%16)?' ':'\n'); }
576 printf("server random\n");
577 { int z; for (z = 0; z<SSL3_RANDOM_SIZE; z++) printf("%02X%c", s->s3->server_random[z],((z+1)%16)?' ':'\n'); }
578 printf("pre-master\n");
579 { int z; for (z = 0; z<s->session->master_key_length; z++) printf("%02X%c", s->session->master_key[z],((z+1)%16)?' ':'\n'); }
580#endif
581 if (!tls1_generate_key_block(s, p1, p2, num)) 562 if (!tls1_generate_key_block(s, p1, p2, num))
582 goto err; 563 goto err;
583#ifdef TLS_DEBUG
584 printf("\nkey block\n");
585 { int z; for (z = 0; z<num; z++) printf("%02X%c", p1[z],((z+1)%16)?' ':'\n'); }
586#endif
587 564
588 if (!(s->options & SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS) && 565 if (!(s->options & SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS) &&
589 s->method->version <= TLS1_VERSION) { 566 s->method->version <= TLS1_VERSION) {
@@ -919,16 +896,6 @@ tls1_mac(SSL *ssl, unsigned char *md, int send)
919 896
920 if (!stream_mac) 897 if (!stream_mac)
921 EVP_MD_CTX_cleanup(&hmac); 898 EVP_MD_CTX_cleanup(&hmac);
922#ifdef TLS_DEBUG
923 printf("sec=");
924 {unsigned int z; for (z = 0; z<md_size; z++) printf("%02X ", mac_sec[z]); printf("\n"); }
925 printf("seq=");
926 {int z; for (z = 0; z<8; z++) printf("%02X ", seq[z]); printf("\n"); }
927 printf("buf=");
928 {int z; for (z = 0; z<5; z++) printf("%02X ", buf[z]); printf("\n"); }
929 printf("rec=");
930 {unsigned int z; for (z = 0; z<rec->length; z++) printf("%02X ", buf[z]); printf("\n"); }
931#endif
932 899
933 if (ssl->version != DTLS1_VERSION && ssl->version != DTLS1_BAD_VER) { 900 if (ssl->version != DTLS1_VERSION && ssl->version != DTLS1_BAD_VER) {
934 for (i = 7; i >= 0; i--) { 901 for (i = 7; i >= 0; i--) {
@@ -938,9 +905,6 @@ tls1_mac(SSL *ssl, unsigned char *md, int send)
938 } 905 }
939 } 906 }
940 907
941#ifdef TLS_DEBUG
942 {unsigned int z; for (z = 0; z<md_size; z++) printf("%02X ", md[z]); printf("\n"); }
943#endif
944 return (md_size); 908 return (md_size);
945} 909}
946 910
@@ -973,16 +937,6 @@ tls1_generate_master_secret(SSL *s, unsigned char *out, unsigned char *p,
973 so, sol, 937 so, sol,
974 p, len, 938 p, len,
975 s->session->master_key, buff, sizeof buff); 939 s->session->master_key, buff, sizeof buff);
976#ifdef SSL_DEBUG
977 fprintf(stderr, "Premaster Secret:\n");
978 BIO_dump_fp(stderr, (char *)p, len);
979 fprintf(stderr, "Client Random:\n");
980 BIO_dump_fp(stderr, (char *)s->s3->client_random, SSL3_RANDOM_SIZE);
981 fprintf(stderr, "Server Random:\n");
982 BIO_dump_fp(stderr, (char *)s->s3->server_random, SSL3_RANDOM_SIZE);
983 fprintf(stderr, "Master Secret:\n");
984 BIO_dump_fp(stderr, (char *)s->session->master_key, SSL3_MASTER_SECRET_SIZE);
985#endif
986 940
987 return (SSL3_MASTER_SECRET_SIZE); 941 return (SSL3_MASTER_SECRET_SIZE);
988} 942}