diff options
author | doug <> | 2015-06-17 06:49:27 +0000 |
---|---|---|
committer | doug <> | 2015-06-17 06:49:27 +0000 |
commit | a68ddb622101bfa87cb91864b28033b49cba1deb (patch) | |
tree | 5a4a5953b0d5506bb0cbf2dc5254ef1a077d046f /src | |
parent | 924d478ace6d3fb8033502da649ef6094b7ee75a (diff) | |
download | openbsd-a68ddb622101bfa87cb91864b28033b49cba1deb.tar.gz openbsd-a68ddb622101bfa87cb91864b28033b49cba1deb.tar.bz2 openbsd-a68ddb622101bfa87cb91864b28033b49cba1deb.zip |
Cleanup SSL_OP_* compat flags in ssl.h.
These were recently removed and are now set to 0:
SSL_OP_NETSCAPE_CA_DN_BUG
SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG
SSL_OP_SSLEAY_080_CLIENT_DH_BUG
The code associated with these was deleted in the past at some point
and these are also now 0:
SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION
SSL_OP_EPHEMERAL_RSA
SSL_OP_MICROSOFT_SESS_ID_BUG
SSL_OP_NETSCAPE_CHALLENGE_BUG
SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
The SSL_OP_ALL macro has been updated to reflect the removals.
ok miod@ jsing@
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libssl/src/ssl/ssl.h | 55 | ||||
-rw-r--r-- | src/lib/libssl/ssl.h | 55 |
2 files changed, 48 insertions, 62 deletions
diff --git a/src/lib/libssl/src/ssl/ssl.h b/src/lib/libssl/src/ssl/ssl.h index 73d007400f..99271b5cb6 100644 --- a/src/lib/libssl/src/ssl/ssl.h +++ b/src/lib/libssl/src/ssl/ssl.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl.h,v 1.83 2015/02/22 15:54:27 jsing Exp $ */ | 1 | /* $OpenBSD: ssl.h,v 1.84 2015/06/17 06:49:27 doug Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -517,24 +517,14 @@ struct ssl_session_st { | |||
517 | 517 | ||
518 | #endif | 518 | #endif |
519 | 519 | ||
520 | #define SSL_OP_MICROSOFT_SESS_ID_BUG 0x00000001L | ||
521 | #define SSL_OP_NETSCAPE_CHALLENGE_BUG 0x00000002L | ||
522 | /* Allow initial connection to servers that don't support RI */ | 520 | /* Allow initial connection to servers that don't support RI */ |
523 | #define SSL_OP_LEGACY_SERVER_CONNECT 0x00000004L | 521 | #define SSL_OP_LEGACY_SERVER_CONNECT 0x00000004L |
524 | #define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x00000008L | ||
525 | #define SSL_OP_TLSEXT_PADDING 0x00000010L | 522 | #define SSL_OP_TLSEXT_PADDING 0x00000010L |
526 | #define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L | 523 | #define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L |
527 | #define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040L | 524 | #define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040L |
528 | #define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x00000080L | ||
529 | #define SSL_OP_TLS_D5_BUG 0x00000100L | 525 | #define SSL_OP_TLS_D5_BUG 0x00000100L |
530 | #define SSL_OP_TLS_BLOCK_PADDING_BUG 0x00000200L | 526 | #define SSL_OP_TLS_BLOCK_PADDING_BUG 0x00000200L |
531 | 527 | ||
532 | /* Hasn't done anything since OpenSSL 0.9.7h, retained for compatibility */ | ||
533 | #define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x0 | ||
534 | |||
535 | /* Refers to ancient SSLREF and SSLv2, retained for compatibility */ | ||
536 | #define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x0 | ||
537 | |||
538 | /* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added | 528 | /* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added |
539 | * in OpenSSL 0.9.6d. Usually (depending on the application protocol) | 529 | * in OpenSSL 0.9.6d. Usually (depending on the application protocol) |
540 | * the workaround is not needed. | 530 | * the workaround is not needed. |
@@ -542,34 +532,25 @@ struct ssl_session_st { | |||
542 | * at all, which is why it was previously included in SSL_OP_ALL. | 532 | * at all, which is why it was previously included in SSL_OP_ALL. |
543 | * Now it's not. | 533 | * Now it's not. |
544 | */ | 534 | */ |
545 | #define SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS 0x00000800L /* added in 0.9.6e */ | 535 | #define SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS 0x00000800L /* added in 0.9.6e */ |
546 | |||
547 | /* SSL_OP_ALL: various bug workarounds that should be rather harmless. | ||
548 | * This used to be 0x000FFFFFL before 0.9.7. */ | ||
549 | #define SSL_OP_ALL 0x800003FFL | ||
550 | 536 | ||
551 | /* DTLS options */ | 537 | /* DTLS options */ |
552 | #define SSL_OP_NO_QUERY_MTU 0x00001000L | 538 | #define SSL_OP_NO_QUERY_MTU 0x00001000L |
553 | /* Turn on Cookie Exchange (on relevant for servers) */ | 539 | /* Turn on Cookie Exchange (on relevant for servers) */ |
554 | #define SSL_OP_COOKIE_EXCHANGE 0x00002000L | 540 | #define SSL_OP_COOKIE_EXCHANGE 0x00002000L |
555 | /* Don't use RFC4507 ticket extension */ | 541 | /* Don't use RFC4507 ticket extension */ |
556 | #define SSL_OP_NO_TICKET 0x00004000L | 542 | #define SSL_OP_NO_TICKET 0x00004000L |
557 | /* Use Cisco's "speshul" version of DTLS_BAD_VER (as client) */ | 543 | /* Use Cisco's "speshul" version of DTLS_BAD_VER (as client) */ |
558 | #define SSL_OP_CISCO_ANYCONNECT 0x00008000L | 544 | #define SSL_OP_CISCO_ANYCONNECT 0x00008000L |
559 | 545 | ||
560 | /* As server, disallow session resumption on renegotiation */ | 546 | /* As server, disallow session resumption on renegotiation */ |
561 | #define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION 0x00010000L | 547 | #define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION 0x00010000L |
562 | /* Don't use compression even if supported */ | 548 | /* Don't use compression even if supported */ |
563 | #define SSL_OP_NO_COMPRESSION 0x00020000L | 549 | #define SSL_OP_NO_COMPRESSION 0x00020000L |
564 | /* Permit unsafe legacy renegotiation */ | ||
565 | #define SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION 0x00040000L | ||
566 | /* If set, always create a new key when using tmp_ecdh parameters */ | 550 | /* If set, always create a new key when using tmp_ecdh parameters */ |
567 | #define SSL_OP_SINGLE_ECDH_USE 0x00080000L | 551 | #define SSL_OP_SINGLE_ECDH_USE 0x00080000L |
568 | /* If set, always create a new key when using tmp_dh parameters */ | 552 | /* If set, always create a new key when using tmp_dh parameters */ |
569 | #define SSL_OP_SINGLE_DH_USE 0x00100000L | 553 | #define SSL_OP_SINGLE_DH_USE 0x00100000L |
570 | /* Set to always use the tmp_rsa key when doing RSA operations, | ||
571 | * even when this violates protocol specs */ | ||
572 | #define SSL_OP_EPHEMERAL_RSA 0x00200000L | ||
573 | /* Set on servers to choose the cipher according to the server's | 554 | /* Set on servers to choose the cipher according to the server's |
574 | * preferences */ | 555 | * preferences */ |
575 | #define SSL_OP_CIPHER_SERVER_PREFERENCE 0x00400000L | 556 | #define SSL_OP_CIPHER_SERVER_PREFERENCE 0x00400000L |
@@ -585,18 +566,30 @@ struct ssl_session_st { | |||
585 | #define SSL_OP_NO_TLSv1_2 0x08000000L | 566 | #define SSL_OP_NO_TLSv1_2 0x08000000L |
586 | #define SSL_OP_NO_TLSv1_1 0x10000000L | 567 | #define SSL_OP_NO_TLSv1_1 0x10000000L |
587 | 568 | ||
588 | /* Obsolete flags kept for compatibility. No sane code should use them. */ | ||
589 | #define SSL_OP_PKCS1_CHECK_1 0x0 | ||
590 | #define SSL_OP_PKCS1_CHECK_2 0x0 | ||
591 | |||
592 | #define SSL_OP_NETSCAPE_CA_DN_BUG 0x20000000L | ||
593 | #define SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG 0x40000000L | ||
594 | /* Make server add server-hello extension from early version of | 569 | /* Make server add server-hello extension from early version of |
595 | * cryptopro draft, when GOST ciphersuite is negotiated. | 570 | * cryptopro draft, when GOST ciphersuite is negotiated. |
596 | * Required for interoperability with CryptoPro CSP 3.x | 571 | * Required for interoperability with CryptoPro CSP 3.x |
597 | */ | 572 | */ |
598 | #define SSL_OP_CRYPTOPRO_TLSEXT_BUG 0x80000000L | 573 | #define SSL_OP_CRYPTOPRO_TLSEXT_BUG 0x80000000L |
599 | 574 | ||
575 | /* SSL_OP_ALL: various bug workarounds that should be rather harmless. | ||
576 | * This used to be 0x000FFFFFL before 0.9.7. */ | ||
577 | #define SSL_OP_ALL 0x80000374L | ||
578 | |||
579 | /* Obsolete flags kept for compatibility. No sane code should use them. */ | ||
580 | #define SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION 0x0 | ||
581 | #define SSL_OP_EPHEMERAL_RSA 0x0 | ||
582 | #define SSL_OP_MICROSOFT_SESS_ID_BUG 0x0 | ||
583 | #define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x0 | ||
584 | #define SSL_OP_NETSCAPE_CA_DN_BUG 0x0 | ||
585 | #define SSL_OP_NETSCAPE_CHALLENGE_BUG 0x0 | ||
586 | #define SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG 0x0 | ||
587 | #define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x0 | ||
588 | #define SSL_OP_PKCS1_CHECK_1 0x0 | ||
589 | #define SSL_OP_PKCS1_CHECK_2 0x0 | ||
590 | #define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x0 | ||
591 | #define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x0 | ||
592 | |||
600 | /* Allow SSL_write(..., n) to return r with 0 < r < n (i.e. report success | 593 | /* Allow SSL_write(..., n) to return r with 0 < r < n (i.e. report success |
601 | * when just a single record has been written): */ | 594 | * when just a single record has been written): */ |
602 | #define SSL_MODE_ENABLE_PARTIAL_WRITE 0x00000001L | 595 | #define SSL_MODE_ENABLE_PARTIAL_WRITE 0x00000001L |
diff --git a/src/lib/libssl/ssl.h b/src/lib/libssl/ssl.h index 73d007400f..99271b5cb6 100644 --- a/src/lib/libssl/ssl.h +++ b/src/lib/libssl/ssl.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl.h,v 1.83 2015/02/22 15:54:27 jsing Exp $ */ | 1 | /* $OpenBSD: ssl.h,v 1.84 2015/06/17 06:49:27 doug Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -517,24 +517,14 @@ struct ssl_session_st { | |||
517 | 517 | ||
518 | #endif | 518 | #endif |
519 | 519 | ||
520 | #define SSL_OP_MICROSOFT_SESS_ID_BUG 0x00000001L | ||
521 | #define SSL_OP_NETSCAPE_CHALLENGE_BUG 0x00000002L | ||
522 | /* Allow initial connection to servers that don't support RI */ | 520 | /* Allow initial connection to servers that don't support RI */ |
523 | #define SSL_OP_LEGACY_SERVER_CONNECT 0x00000004L | 521 | #define SSL_OP_LEGACY_SERVER_CONNECT 0x00000004L |
524 | #define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x00000008L | ||
525 | #define SSL_OP_TLSEXT_PADDING 0x00000010L | 522 | #define SSL_OP_TLSEXT_PADDING 0x00000010L |
526 | #define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L | 523 | #define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L |
527 | #define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040L | 524 | #define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040L |
528 | #define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x00000080L | ||
529 | #define SSL_OP_TLS_D5_BUG 0x00000100L | 525 | #define SSL_OP_TLS_D5_BUG 0x00000100L |
530 | #define SSL_OP_TLS_BLOCK_PADDING_BUG 0x00000200L | 526 | #define SSL_OP_TLS_BLOCK_PADDING_BUG 0x00000200L |
531 | 527 | ||
532 | /* Hasn't done anything since OpenSSL 0.9.7h, retained for compatibility */ | ||
533 | #define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x0 | ||
534 | |||
535 | /* Refers to ancient SSLREF and SSLv2, retained for compatibility */ | ||
536 | #define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x0 | ||
537 | |||
538 | /* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added | 528 | /* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added |
539 | * in OpenSSL 0.9.6d. Usually (depending on the application protocol) | 529 | * in OpenSSL 0.9.6d. Usually (depending on the application protocol) |
540 | * the workaround is not needed. | 530 | * the workaround is not needed. |
@@ -542,34 +532,25 @@ struct ssl_session_st { | |||
542 | * at all, which is why it was previously included in SSL_OP_ALL. | 532 | * at all, which is why it was previously included in SSL_OP_ALL. |
543 | * Now it's not. | 533 | * Now it's not. |
544 | */ | 534 | */ |
545 | #define SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS 0x00000800L /* added in 0.9.6e */ | 535 | #define SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS 0x00000800L /* added in 0.9.6e */ |
546 | |||
547 | /* SSL_OP_ALL: various bug workarounds that should be rather harmless. | ||
548 | * This used to be 0x000FFFFFL before 0.9.7. */ | ||
549 | #define SSL_OP_ALL 0x800003FFL | ||
550 | 536 | ||
551 | /* DTLS options */ | 537 | /* DTLS options */ |
552 | #define SSL_OP_NO_QUERY_MTU 0x00001000L | 538 | #define SSL_OP_NO_QUERY_MTU 0x00001000L |
553 | /* Turn on Cookie Exchange (on relevant for servers) */ | 539 | /* Turn on Cookie Exchange (on relevant for servers) */ |
554 | #define SSL_OP_COOKIE_EXCHANGE 0x00002000L | 540 | #define SSL_OP_COOKIE_EXCHANGE 0x00002000L |
555 | /* Don't use RFC4507 ticket extension */ | 541 | /* Don't use RFC4507 ticket extension */ |
556 | #define SSL_OP_NO_TICKET 0x00004000L | 542 | #define SSL_OP_NO_TICKET 0x00004000L |
557 | /* Use Cisco's "speshul" version of DTLS_BAD_VER (as client) */ | 543 | /* Use Cisco's "speshul" version of DTLS_BAD_VER (as client) */ |
558 | #define SSL_OP_CISCO_ANYCONNECT 0x00008000L | 544 | #define SSL_OP_CISCO_ANYCONNECT 0x00008000L |
559 | 545 | ||
560 | /* As server, disallow session resumption on renegotiation */ | 546 | /* As server, disallow session resumption on renegotiation */ |
561 | #define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION 0x00010000L | 547 | #define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION 0x00010000L |
562 | /* Don't use compression even if supported */ | 548 | /* Don't use compression even if supported */ |
563 | #define SSL_OP_NO_COMPRESSION 0x00020000L | 549 | #define SSL_OP_NO_COMPRESSION 0x00020000L |
564 | /* Permit unsafe legacy renegotiation */ | ||
565 | #define SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION 0x00040000L | ||
566 | /* If set, always create a new key when using tmp_ecdh parameters */ | 550 | /* If set, always create a new key when using tmp_ecdh parameters */ |
567 | #define SSL_OP_SINGLE_ECDH_USE 0x00080000L | 551 | #define SSL_OP_SINGLE_ECDH_USE 0x00080000L |
568 | /* If set, always create a new key when using tmp_dh parameters */ | 552 | /* If set, always create a new key when using tmp_dh parameters */ |
569 | #define SSL_OP_SINGLE_DH_USE 0x00100000L | 553 | #define SSL_OP_SINGLE_DH_USE 0x00100000L |
570 | /* Set to always use the tmp_rsa key when doing RSA operations, | ||
571 | * even when this violates protocol specs */ | ||
572 | #define SSL_OP_EPHEMERAL_RSA 0x00200000L | ||
573 | /* Set on servers to choose the cipher according to the server's | 554 | /* Set on servers to choose the cipher according to the server's |
574 | * preferences */ | 555 | * preferences */ |
575 | #define SSL_OP_CIPHER_SERVER_PREFERENCE 0x00400000L | 556 | #define SSL_OP_CIPHER_SERVER_PREFERENCE 0x00400000L |
@@ -585,18 +566,30 @@ struct ssl_session_st { | |||
585 | #define SSL_OP_NO_TLSv1_2 0x08000000L | 566 | #define SSL_OP_NO_TLSv1_2 0x08000000L |
586 | #define SSL_OP_NO_TLSv1_1 0x10000000L | 567 | #define SSL_OP_NO_TLSv1_1 0x10000000L |
587 | 568 | ||
588 | /* Obsolete flags kept for compatibility. No sane code should use them. */ | ||
589 | #define SSL_OP_PKCS1_CHECK_1 0x0 | ||
590 | #define SSL_OP_PKCS1_CHECK_2 0x0 | ||
591 | |||
592 | #define SSL_OP_NETSCAPE_CA_DN_BUG 0x20000000L | ||
593 | #define SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG 0x40000000L | ||
594 | /* Make server add server-hello extension from early version of | 569 | /* Make server add server-hello extension from early version of |
595 | * cryptopro draft, when GOST ciphersuite is negotiated. | 570 | * cryptopro draft, when GOST ciphersuite is negotiated. |
596 | * Required for interoperability with CryptoPro CSP 3.x | 571 | * Required for interoperability with CryptoPro CSP 3.x |
597 | */ | 572 | */ |
598 | #define SSL_OP_CRYPTOPRO_TLSEXT_BUG 0x80000000L | 573 | #define SSL_OP_CRYPTOPRO_TLSEXT_BUG 0x80000000L |
599 | 574 | ||
575 | /* SSL_OP_ALL: various bug workarounds that should be rather harmless. | ||
576 | * This used to be 0x000FFFFFL before 0.9.7. */ | ||
577 | #define SSL_OP_ALL 0x80000374L | ||
578 | |||
579 | /* Obsolete flags kept for compatibility. No sane code should use them. */ | ||
580 | #define SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION 0x0 | ||
581 | #define SSL_OP_EPHEMERAL_RSA 0x0 | ||
582 | #define SSL_OP_MICROSOFT_SESS_ID_BUG 0x0 | ||
583 | #define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x0 | ||
584 | #define SSL_OP_NETSCAPE_CA_DN_BUG 0x0 | ||
585 | #define SSL_OP_NETSCAPE_CHALLENGE_BUG 0x0 | ||
586 | #define SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG 0x0 | ||
587 | #define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x0 | ||
588 | #define SSL_OP_PKCS1_CHECK_1 0x0 | ||
589 | #define SSL_OP_PKCS1_CHECK_2 0x0 | ||
590 | #define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x0 | ||
591 | #define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x0 | ||
592 | |||
600 | /* Allow SSL_write(..., n) to return r with 0 < r < n (i.e. report success | 593 | /* Allow SSL_write(..., n) to return r with 0 < r < n (i.e. report success |
601 | * when just a single record has been written): */ | 594 | * when just a single record has been written): */ |
602 | #define SSL_MODE_ENABLE_PARTIAL_WRITE 0x00000001L | 595 | #define SSL_MODE_ENABLE_PARTIAL_WRITE 0x00000001L |