summaryrefslogtreecommitdiff
path: root/src/lib/libssl/tls13_client.c
diff options
context:
space:
mode:
authorjsing <>2020-05-19 16:35:21 +0000
committerjsing <>2020-05-19 16:35:21 +0000
commit6019fdeeec36b84a28e360616bf851bbb984af8c (patch)
tree5ff7e57b9c4172ec2feea5a8c0a76ee21339a4af /src/lib/libssl/tls13_client.c
parent301bb2dc3c4393a25056c7a1ec7b1d4a5efe6ea2 (diff)
downloadopenbsd-6019fdeeec36b84a28e360616bf851bbb984af8c.tar.gz
openbsd-6019fdeeec36b84a28e360616bf851bbb984af8c.tar.bz2
openbsd-6019fdeeec36b84a28e360616bf851bbb984af8c.zip
Replace SSL_PKEY_RSA_ENC/SSL_PKEY_RSA_SIGN with SSL_PKEY_RSA.
Some time prior to SSLeay 0.8.1b, SSL_PKEY_RSA_SIGN got added with the intention of handling RSA sign only certificates... this incomplete code had the following comment: /* check to see if this is a signing only certificate */ /* EAY EAY EAY EAY */ And while the comment was removed in 2005, the incomplete RSA sign-only handling has remained ever since. Remove SSL_PKEY_RSA_SIGN and rename SSL_PKEY_RSA_ENC to SSL_PKEY_RSA. While here also remove the unused SSL_PKEY_DH_RSA. ok tb@
Diffstat (limited to 'src/lib/libssl/tls13_client.c')
-rw-r--r--src/lib/libssl/tls13_client.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/src/lib/libssl/tls13_client.c b/src/lib/libssl/tls13_client.c
index a17b2bd47f..cef49c496e 100644
--- a/src/lib/libssl/tls13_client.c
+++ b/src/lib/libssl/tls13_client.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls13_client.c,v 1.62 2020/05/19 01:30:34 beck Exp $ */ 1/* $OpenBSD: tls13_client.c,v 1.63 2020/05/19 16:35:21 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org>
4 * 4 *
@@ -834,7 +834,7 @@ tls13_client_certificate_send(struct tls13_ctx *ctx, CBB *cbb)
834 int i, ret = 0; 834 int i, ret = 0;
835 835
836 /* XXX - Need to revisit certificate selection. */ 836 /* XXX - Need to revisit certificate selection. */
837 cpk = &s->cert->pkeys[SSL_PKEY_RSA_ENC]; 837 cpk = &s->cert->pkeys[SSL_PKEY_RSA];
838 838
839 if ((chain = cpk->chain) == NULL) 839 if ((chain = cpk->chain) == NULL)
840 chain = s->ctx->extra_certs; 840 chain = s->ctx->extra_certs;
@@ -884,7 +884,7 @@ tls13_client_certificate_verify_send(struct tls13_ctx *ctx, CBB *cbb)
884 memset(&sig_cbb, 0, sizeof(sig_cbb)); 884 memset(&sig_cbb, 0, sizeof(sig_cbb));
885 885
886 /* XXX - Need to revisit certificate selection. */ 886 /* XXX - Need to revisit certificate selection. */
887 cpk = &s->cert->pkeys[SSL_PKEY_RSA_ENC]; 887 cpk = &s->cert->pkeys[SSL_PKEY_RSA];
888 pkey = cpk->privatekey; 888 pkey = cpk->privatekey;
889 889
890 if ((sigalg = ssl_sigalg_select(s, pkey)) == NULL) { 890 if ((sigalg = ssl_sigalg_select(s, pkey)) == NULL) {