diff options
author | jsing <> | 2020-05-19 16:35:21 +0000 |
---|---|---|
committer | jsing <> | 2020-05-19 16:35:21 +0000 |
commit | 6019fdeeec36b84a28e360616bf851bbb984af8c (patch) | |
tree | 5ff7e57b9c4172ec2feea5a8c0a76ee21339a4af /src/lib/libssl/tls13_client.c | |
parent | 301bb2dc3c4393a25056c7a1ec7b1d4a5efe6ea2 (diff) | |
download | openbsd-6019fdeeec36b84a28e360616bf851bbb984af8c.tar.gz openbsd-6019fdeeec36b84a28e360616bf851bbb984af8c.tar.bz2 openbsd-6019fdeeec36b84a28e360616bf851bbb984af8c.zip |
Replace SSL_PKEY_RSA_ENC/SSL_PKEY_RSA_SIGN with SSL_PKEY_RSA.
Some time prior to SSLeay 0.8.1b, SSL_PKEY_RSA_SIGN got added with the
intention of handling RSA sign only certificates... this incomplete code
had the following comment:
/* check to see if this is a signing only certificate */
/* EAY EAY EAY EAY */
And while the comment was removed in 2005, the incomplete RSA sign-only
handling has remained ever since.
Remove SSL_PKEY_RSA_SIGN and rename SSL_PKEY_RSA_ENC to SSL_PKEY_RSA. While
here also remove the unused SSL_PKEY_DH_RSA.
ok tb@
Diffstat (limited to 'src/lib/libssl/tls13_client.c')
-rw-r--r-- | src/lib/libssl/tls13_client.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/src/lib/libssl/tls13_client.c b/src/lib/libssl/tls13_client.c index a17b2bd47f..cef49c496e 100644 --- a/src/lib/libssl/tls13_client.c +++ b/src/lib/libssl/tls13_client.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: tls13_client.c,v 1.62 2020/05/19 01:30:34 beck Exp $ */ | 1 | /* $OpenBSD: tls13_client.c,v 1.63 2020/05/19 16:35:21 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -834,7 +834,7 @@ tls13_client_certificate_send(struct tls13_ctx *ctx, CBB *cbb) | |||
834 | int i, ret = 0; | 834 | int i, ret = 0; |
835 | 835 | ||
836 | /* XXX - Need to revisit certificate selection. */ | 836 | /* XXX - Need to revisit certificate selection. */ |
837 | cpk = &s->cert->pkeys[SSL_PKEY_RSA_ENC]; | 837 | cpk = &s->cert->pkeys[SSL_PKEY_RSA]; |
838 | 838 | ||
839 | if ((chain = cpk->chain) == NULL) | 839 | if ((chain = cpk->chain) == NULL) |
840 | chain = s->ctx->extra_certs; | 840 | chain = s->ctx->extra_certs; |
@@ -884,7 +884,7 @@ tls13_client_certificate_verify_send(struct tls13_ctx *ctx, CBB *cbb) | |||
884 | memset(&sig_cbb, 0, sizeof(sig_cbb)); | 884 | memset(&sig_cbb, 0, sizeof(sig_cbb)); |
885 | 885 | ||
886 | /* XXX - Need to revisit certificate selection. */ | 886 | /* XXX - Need to revisit certificate selection. */ |
887 | cpk = &s->cert->pkeys[SSL_PKEY_RSA_ENC]; | 887 | cpk = &s->cert->pkeys[SSL_PKEY_RSA]; |
888 | pkey = cpk->privatekey; | 888 | pkey = cpk->privatekey; |
889 | 889 | ||
890 | if ((sigalg = ssl_sigalg_select(s, pkey)) == NULL) { | 890 | if ((sigalg = ssl_sigalg_select(s, pkey)) == NULL) { |