diff options
author | jsing <> | 2014-12-14 13:45:47 +0000 |
---|---|---|
committer | jsing <> | 2014-12-14 13:45:47 +0000 |
commit | 8c353d1cc8300944b77e9bee6d4be75bd546eec1 (patch) | |
tree | d2af420fa7743cb80381777844298631d63af1b4 /src | |
parent | db1b1946f7c531f0bd6a78322c13cda73600be71 (diff) | |
download | openbsd-8c353d1cc8300944b77e9bee6d4be75bd546eec1.tar.gz openbsd-8c353d1cc8300944b77e9bee6d4be75bd546eec1.tar.bz2 openbsd-8c353d1cc8300944b77e9bee6d4be75bd546eec1.zip |
unifdef NETSCAPE_HANG_BUG from the DTLS code. The code is not currently
enabled and I would hope that no one is using client certificates with DTLS
and Netscape, assuming it even supported it...
ok bcook@ miod@
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libssl/d1_srvr.c | 24 | ||||
-rw-r--r-- | src/lib/libssl/src/ssl/d1_srvr.c | 24 |
2 files changed, 2 insertions, 46 deletions
diff --git a/src/lib/libssl/d1_srvr.c b/src/lib/libssl/d1_srvr.c index ee0e62336f..71aa5e75d2 100644 --- a/src/lib/libssl/d1_srvr.c +++ b/src/lib/libssl/d1_srvr.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: d1_srvr.c,v 1.43 2014/12/10 15:43:31 jsing Exp $ */ | 1 | /* $OpenBSD: d1_srvr.c,v 1.44 2014/12/14 13:45:47 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * DTLS implementation written by Nagendra Modadugu | 3 | * DTLS implementation written by Nagendra Modadugu |
4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. | 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. |
@@ -513,7 +513,6 @@ dtls1_accept(SSL *s) | |||
513 | ret = dtls1_send_certificate_request(s); | 513 | ret = dtls1_send_certificate_request(s); |
514 | if (ret <= 0) | 514 | if (ret <= 0) |
515 | goto end; | 515 | goto end; |
516 | #ifndef NETSCAPE_HANG_BUG | ||
517 | s->state = SSL3_ST_SW_SRVR_DONE_A; | 516 | s->state = SSL3_ST_SW_SRVR_DONE_A; |
518 | #ifndef OPENSSL_NO_SCTP | 517 | #ifndef OPENSSL_NO_SCTP |
519 | if (BIO_dgram_is_sctp(SSL_get_wbio(s))) { | 518 | if (BIO_dgram_is_sctp(SSL_get_wbio(s))) { |
@@ -521,16 +520,6 @@ dtls1_accept(SSL *s) | |||
521 | s->state = DTLS1_SCTP_ST_SW_WRITE_SOCK; | 520 | s->state = DTLS1_SCTP_ST_SW_WRITE_SOCK; |
522 | } | 521 | } |
523 | #endif | 522 | #endif |
524 | #else | ||
525 | s->state = SSL3_ST_SW_FLUSH; | ||
526 | s->s3->tmp.next_state = SSL3_ST_SR_CERT_A; | ||
527 | #ifndef OPENSSL_NO_SCTP | ||
528 | if (BIO_dgram_is_sctp(SSL_get_wbio(s))) { | ||
529 | s->d1->next_state = s->s3->tmp.next_state; | ||
530 | s->s3->tmp.next_state = DTLS1_SCTP_ST_SW_WRITE_SOCK; | ||
531 | } | ||
532 | #endif | ||
533 | #endif | ||
534 | s->init_num = 0; | 523 | s->init_num = 0; |
535 | } | 524 | } |
536 | break; | 525 | break; |
@@ -1375,17 +1364,6 @@ dtls1_send_certificate_request(SSL *s) | |||
1375 | 1364 | ||
1376 | s->init_num = n + DTLS1_HM_HEADER_LENGTH; | 1365 | s->init_num = n + DTLS1_HM_HEADER_LENGTH; |
1377 | s->init_off = 0; | 1366 | s->init_off = 0; |
1378 | #ifdef NETSCAPE_HANG_BUG | ||
1379 | /* XXX: what to do about this? */ | ||
1380 | p = (unsigned char *)s->init_buf->data + s->init_num; | ||
1381 | |||
1382 | /* do the header */ | ||
1383 | *(p++) = SSL3_MT_SERVER_DONE; | ||
1384 | *(p++) = 0; | ||
1385 | *(p++) = 0; | ||
1386 | *(p++) = 0; | ||
1387 | s->init_num += 4; | ||
1388 | #endif | ||
1389 | 1367 | ||
1390 | /* XDTLS: set message header ? */ | 1368 | /* XDTLS: set message header ? */ |
1391 | msg_len = s->init_num - DTLS1_HM_HEADER_LENGTH; | 1369 | msg_len = s->init_num - DTLS1_HM_HEADER_LENGTH; |
diff --git a/src/lib/libssl/src/ssl/d1_srvr.c b/src/lib/libssl/src/ssl/d1_srvr.c index ee0e62336f..71aa5e75d2 100644 --- a/src/lib/libssl/src/ssl/d1_srvr.c +++ b/src/lib/libssl/src/ssl/d1_srvr.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: d1_srvr.c,v 1.43 2014/12/10 15:43:31 jsing Exp $ */ | 1 | /* $OpenBSD: d1_srvr.c,v 1.44 2014/12/14 13:45:47 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * DTLS implementation written by Nagendra Modadugu | 3 | * DTLS implementation written by Nagendra Modadugu |
4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. | 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. |
@@ -513,7 +513,6 @@ dtls1_accept(SSL *s) | |||
513 | ret = dtls1_send_certificate_request(s); | 513 | ret = dtls1_send_certificate_request(s); |
514 | if (ret <= 0) | 514 | if (ret <= 0) |
515 | goto end; | 515 | goto end; |
516 | #ifndef NETSCAPE_HANG_BUG | ||
517 | s->state = SSL3_ST_SW_SRVR_DONE_A; | 516 | s->state = SSL3_ST_SW_SRVR_DONE_A; |
518 | #ifndef OPENSSL_NO_SCTP | 517 | #ifndef OPENSSL_NO_SCTP |
519 | if (BIO_dgram_is_sctp(SSL_get_wbio(s))) { | 518 | if (BIO_dgram_is_sctp(SSL_get_wbio(s))) { |
@@ -521,16 +520,6 @@ dtls1_accept(SSL *s) | |||
521 | s->state = DTLS1_SCTP_ST_SW_WRITE_SOCK; | 520 | s->state = DTLS1_SCTP_ST_SW_WRITE_SOCK; |
522 | } | 521 | } |
523 | #endif | 522 | #endif |
524 | #else | ||
525 | s->state = SSL3_ST_SW_FLUSH; | ||
526 | s->s3->tmp.next_state = SSL3_ST_SR_CERT_A; | ||
527 | #ifndef OPENSSL_NO_SCTP | ||
528 | if (BIO_dgram_is_sctp(SSL_get_wbio(s))) { | ||
529 | s->d1->next_state = s->s3->tmp.next_state; | ||
530 | s->s3->tmp.next_state = DTLS1_SCTP_ST_SW_WRITE_SOCK; | ||
531 | } | ||
532 | #endif | ||
533 | #endif | ||
534 | s->init_num = 0; | 523 | s->init_num = 0; |
535 | } | 524 | } |
536 | break; | 525 | break; |
@@ -1375,17 +1364,6 @@ dtls1_send_certificate_request(SSL *s) | |||
1375 | 1364 | ||
1376 | s->init_num = n + DTLS1_HM_HEADER_LENGTH; | 1365 | s->init_num = n + DTLS1_HM_HEADER_LENGTH; |
1377 | s->init_off = 0; | 1366 | s->init_off = 0; |
1378 | #ifdef NETSCAPE_HANG_BUG | ||
1379 | /* XXX: what to do about this? */ | ||
1380 | p = (unsigned char *)s->init_buf->data + s->init_num; | ||
1381 | |||
1382 | /* do the header */ | ||
1383 | *(p++) = SSL3_MT_SERVER_DONE; | ||
1384 | *(p++) = 0; | ||
1385 | *(p++) = 0; | ||
1386 | *(p++) = 0; | ||
1387 | s->init_num += 4; | ||
1388 | #endif | ||
1389 | 1367 | ||
1390 | /* XDTLS: set message header ? */ | 1368 | /* XDTLS: set message header ? */ |
1391 | msg_len = s->init_num - DTLS1_HM_HEADER_LENGTH; | 1369 | msg_len = s->init_num - DTLS1_HM_HEADER_LENGTH; |