summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authordoug <>2015-06-17 06:49:27 +0000
committerdoug <>2015-06-17 06:49:27 +0000
commita68ddb622101bfa87cb91864b28033b49cba1deb (patch)
tree5a4a5953b0d5506bb0cbf2dc5254ef1a077d046f /src
parent924d478ace6d3fb8033502da649ef6094b7ee75a (diff)
downloadopenbsd-a68ddb622101bfa87cb91864b28033b49cba1deb.tar.gz
openbsd-a68ddb622101bfa87cb91864b28033b49cba1deb.tar.bz2
openbsd-a68ddb622101bfa87cb91864b28033b49cba1deb.zip
Cleanup SSL_OP_* compat flags in ssl.h.
These were recently removed and are now set to 0: SSL_OP_NETSCAPE_CA_DN_BUG SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG SSL_OP_SSLEAY_080_CLIENT_DH_BUG The code associated with these was deleted in the past at some point and these are also now 0: SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION SSL_OP_EPHEMERAL_RSA SSL_OP_MICROSOFT_SESS_ID_BUG SSL_OP_NETSCAPE_CHALLENGE_BUG SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG The SSL_OP_ALL macro has been updated to reflect the removals. ok miod@ jsing@
Diffstat (limited to 'src')
-rw-r--r--src/lib/libssl/src/ssl/ssl.h55
-rw-r--r--src/lib/libssl/ssl.h55
2 files changed, 48 insertions, 62 deletions
diff --git a/src/lib/libssl/src/ssl/ssl.h b/src/lib/libssl/src/ssl/ssl.h
index 73d007400f..99271b5cb6 100644
--- a/src/lib/libssl/src/ssl/ssl.h
+++ b/src/lib/libssl/src/ssl/ssl.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl.h,v 1.83 2015/02/22 15:54:27 jsing Exp $ */ 1/* $OpenBSD: ssl.h,v 1.84 2015/06/17 06:49:27 doug Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -517,24 +517,14 @@ struct ssl_session_st {
517 517
518#endif 518#endif
519 519
520#define SSL_OP_MICROSOFT_SESS_ID_BUG 0x00000001L
521#define SSL_OP_NETSCAPE_CHALLENGE_BUG 0x00000002L
522/* Allow initial connection to servers that don't support RI */ 520/* Allow initial connection to servers that don't support RI */
523#define SSL_OP_LEGACY_SERVER_CONNECT 0x00000004L 521#define SSL_OP_LEGACY_SERVER_CONNECT 0x00000004L
524#define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x00000008L
525#define SSL_OP_TLSEXT_PADDING 0x00000010L 522#define SSL_OP_TLSEXT_PADDING 0x00000010L
526#define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L 523#define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L
527#define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040L 524#define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040L
528#define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x00000080L
529#define SSL_OP_TLS_D5_BUG 0x00000100L 525#define SSL_OP_TLS_D5_BUG 0x00000100L
530#define SSL_OP_TLS_BLOCK_PADDING_BUG 0x00000200L 526#define SSL_OP_TLS_BLOCK_PADDING_BUG 0x00000200L
531 527
532/* Hasn't done anything since OpenSSL 0.9.7h, retained for compatibility */
533#define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x0
534
535/* Refers to ancient SSLREF and SSLv2, retained for compatibility */
536#define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x0
537
538/* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added 528/* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added
539 * in OpenSSL 0.9.6d. Usually (depending on the application protocol) 529 * in OpenSSL 0.9.6d. Usually (depending on the application protocol)
540 * the workaround is not needed. 530 * the workaround is not needed.
@@ -542,34 +532,25 @@ struct ssl_session_st {
542 * at all, which is why it was previously included in SSL_OP_ALL. 532 * at all, which is why it was previously included in SSL_OP_ALL.
543 * Now it's not. 533 * Now it's not.
544 */ 534 */
545#define SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS 0x00000800L /* added in 0.9.6e */ 535#define SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS 0x00000800L /* added in 0.9.6e */
546
547/* SSL_OP_ALL: various bug workarounds that should be rather harmless.
548 * This used to be 0x000FFFFFL before 0.9.7. */
549#define SSL_OP_ALL 0x800003FFL
550 536
551/* DTLS options */ 537/* DTLS options */
552#define SSL_OP_NO_QUERY_MTU 0x00001000L 538#define SSL_OP_NO_QUERY_MTU 0x00001000L
553/* Turn on Cookie Exchange (on relevant for servers) */ 539/* Turn on Cookie Exchange (on relevant for servers) */
554#define SSL_OP_COOKIE_EXCHANGE 0x00002000L 540#define SSL_OP_COOKIE_EXCHANGE 0x00002000L
555/* Don't use RFC4507 ticket extension */ 541/* Don't use RFC4507 ticket extension */
556#define SSL_OP_NO_TICKET 0x00004000L 542#define SSL_OP_NO_TICKET 0x00004000L
557/* Use Cisco's "speshul" version of DTLS_BAD_VER (as client) */ 543/* Use Cisco's "speshul" version of DTLS_BAD_VER (as client) */
558#define SSL_OP_CISCO_ANYCONNECT 0x00008000L 544#define SSL_OP_CISCO_ANYCONNECT 0x00008000L
559 545
560/* As server, disallow session resumption on renegotiation */ 546/* As server, disallow session resumption on renegotiation */
561#define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION 0x00010000L 547#define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION 0x00010000L
562/* Don't use compression even if supported */ 548/* Don't use compression even if supported */
563#define SSL_OP_NO_COMPRESSION 0x00020000L 549#define SSL_OP_NO_COMPRESSION 0x00020000L
564/* Permit unsafe legacy renegotiation */
565#define SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION 0x00040000L
566/* If set, always create a new key when using tmp_ecdh parameters */ 550/* If set, always create a new key when using tmp_ecdh parameters */
567#define SSL_OP_SINGLE_ECDH_USE 0x00080000L 551#define SSL_OP_SINGLE_ECDH_USE 0x00080000L
568/* If set, always create a new key when using tmp_dh parameters */ 552/* If set, always create a new key when using tmp_dh parameters */
569#define SSL_OP_SINGLE_DH_USE 0x00100000L 553#define SSL_OP_SINGLE_DH_USE 0x00100000L
570/* Set to always use the tmp_rsa key when doing RSA operations,
571 * even when this violates protocol specs */
572#define SSL_OP_EPHEMERAL_RSA 0x00200000L
573/* Set on servers to choose the cipher according to the server's 554/* Set on servers to choose the cipher according to the server's
574 * preferences */ 555 * preferences */
575#define SSL_OP_CIPHER_SERVER_PREFERENCE 0x00400000L 556#define SSL_OP_CIPHER_SERVER_PREFERENCE 0x00400000L
@@ -585,18 +566,30 @@ struct ssl_session_st {
585#define SSL_OP_NO_TLSv1_2 0x08000000L 566#define SSL_OP_NO_TLSv1_2 0x08000000L
586#define SSL_OP_NO_TLSv1_1 0x10000000L 567#define SSL_OP_NO_TLSv1_1 0x10000000L
587 568
588/* Obsolete flags kept for compatibility. No sane code should use them. */
589#define SSL_OP_PKCS1_CHECK_1 0x0
590#define SSL_OP_PKCS1_CHECK_2 0x0
591
592#define SSL_OP_NETSCAPE_CA_DN_BUG 0x20000000L
593#define SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG 0x40000000L
594/* Make server add server-hello extension from early version of 569/* Make server add server-hello extension from early version of
595 * cryptopro draft, when GOST ciphersuite is negotiated. 570 * cryptopro draft, when GOST ciphersuite is negotiated.
596 * Required for interoperability with CryptoPro CSP 3.x 571 * Required for interoperability with CryptoPro CSP 3.x
597 */ 572 */
598#define SSL_OP_CRYPTOPRO_TLSEXT_BUG 0x80000000L 573#define SSL_OP_CRYPTOPRO_TLSEXT_BUG 0x80000000L
599 574
575/* SSL_OP_ALL: various bug workarounds that should be rather harmless.
576 * This used to be 0x000FFFFFL before 0.9.7. */
577#define SSL_OP_ALL 0x80000374L
578
579/* Obsolete flags kept for compatibility. No sane code should use them. */
580#define SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION 0x0
581#define SSL_OP_EPHEMERAL_RSA 0x0
582#define SSL_OP_MICROSOFT_SESS_ID_BUG 0x0
583#define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x0
584#define SSL_OP_NETSCAPE_CA_DN_BUG 0x0
585#define SSL_OP_NETSCAPE_CHALLENGE_BUG 0x0
586#define SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG 0x0
587#define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x0
588#define SSL_OP_PKCS1_CHECK_1 0x0
589#define SSL_OP_PKCS1_CHECK_2 0x0
590#define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x0
591#define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x0
592
600/* Allow SSL_write(..., n) to return r with 0 < r < n (i.e. report success 593/* Allow SSL_write(..., n) to return r with 0 < r < n (i.e. report success
601 * when just a single record has been written): */ 594 * when just a single record has been written): */
602#define SSL_MODE_ENABLE_PARTIAL_WRITE 0x00000001L 595#define SSL_MODE_ENABLE_PARTIAL_WRITE 0x00000001L
diff --git a/src/lib/libssl/ssl.h b/src/lib/libssl/ssl.h
index 73d007400f..99271b5cb6 100644
--- a/src/lib/libssl/ssl.h
+++ b/src/lib/libssl/ssl.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl.h,v 1.83 2015/02/22 15:54:27 jsing Exp $ */ 1/* $OpenBSD: ssl.h,v 1.84 2015/06/17 06:49:27 doug Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -517,24 +517,14 @@ struct ssl_session_st {
517 517
518#endif 518#endif
519 519
520#define SSL_OP_MICROSOFT_SESS_ID_BUG 0x00000001L
521#define SSL_OP_NETSCAPE_CHALLENGE_BUG 0x00000002L
522/* Allow initial connection to servers that don't support RI */ 520/* Allow initial connection to servers that don't support RI */
523#define SSL_OP_LEGACY_SERVER_CONNECT 0x00000004L 521#define SSL_OP_LEGACY_SERVER_CONNECT 0x00000004L
524#define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x00000008L
525#define SSL_OP_TLSEXT_PADDING 0x00000010L 522#define SSL_OP_TLSEXT_PADDING 0x00000010L
526#define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L 523#define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L
527#define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040L 524#define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040L
528#define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x00000080L
529#define SSL_OP_TLS_D5_BUG 0x00000100L 525#define SSL_OP_TLS_D5_BUG 0x00000100L
530#define SSL_OP_TLS_BLOCK_PADDING_BUG 0x00000200L 526#define SSL_OP_TLS_BLOCK_PADDING_BUG 0x00000200L
531 527
532/* Hasn't done anything since OpenSSL 0.9.7h, retained for compatibility */
533#define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x0
534
535/* Refers to ancient SSLREF and SSLv2, retained for compatibility */
536#define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x0
537
538/* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added 528/* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added
539 * in OpenSSL 0.9.6d. Usually (depending on the application protocol) 529 * in OpenSSL 0.9.6d. Usually (depending on the application protocol)
540 * the workaround is not needed. 530 * the workaround is not needed.
@@ -542,34 +532,25 @@ struct ssl_session_st {
542 * at all, which is why it was previously included in SSL_OP_ALL. 532 * at all, which is why it was previously included in SSL_OP_ALL.
543 * Now it's not. 533 * Now it's not.
544 */ 534 */
545#define SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS 0x00000800L /* added in 0.9.6e */ 535#define SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS 0x00000800L /* added in 0.9.6e */
546
547/* SSL_OP_ALL: various bug workarounds that should be rather harmless.
548 * This used to be 0x000FFFFFL before 0.9.7. */
549#define SSL_OP_ALL 0x800003FFL
550 536
551/* DTLS options */ 537/* DTLS options */
552#define SSL_OP_NO_QUERY_MTU 0x00001000L 538#define SSL_OP_NO_QUERY_MTU 0x00001000L
553/* Turn on Cookie Exchange (on relevant for servers) */ 539/* Turn on Cookie Exchange (on relevant for servers) */
554#define SSL_OP_COOKIE_EXCHANGE 0x00002000L 540#define SSL_OP_COOKIE_EXCHANGE 0x00002000L
555/* Don't use RFC4507 ticket extension */ 541/* Don't use RFC4507 ticket extension */
556#define SSL_OP_NO_TICKET 0x00004000L 542#define SSL_OP_NO_TICKET 0x00004000L
557/* Use Cisco's "speshul" version of DTLS_BAD_VER (as client) */ 543/* Use Cisco's "speshul" version of DTLS_BAD_VER (as client) */
558#define SSL_OP_CISCO_ANYCONNECT 0x00008000L 544#define SSL_OP_CISCO_ANYCONNECT 0x00008000L
559 545
560/* As server, disallow session resumption on renegotiation */ 546/* As server, disallow session resumption on renegotiation */
561#define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION 0x00010000L 547#define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION 0x00010000L
562/* Don't use compression even if supported */ 548/* Don't use compression even if supported */
563#define SSL_OP_NO_COMPRESSION 0x00020000L 549#define SSL_OP_NO_COMPRESSION 0x00020000L
564/* Permit unsafe legacy renegotiation */
565#define SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION 0x00040000L
566/* If set, always create a new key when using tmp_ecdh parameters */ 550/* If set, always create a new key when using tmp_ecdh parameters */
567#define SSL_OP_SINGLE_ECDH_USE 0x00080000L 551#define SSL_OP_SINGLE_ECDH_USE 0x00080000L
568/* If set, always create a new key when using tmp_dh parameters */ 552/* If set, always create a new key when using tmp_dh parameters */
569#define SSL_OP_SINGLE_DH_USE 0x00100000L 553#define SSL_OP_SINGLE_DH_USE 0x00100000L
570/* Set to always use the tmp_rsa key when doing RSA operations,
571 * even when this violates protocol specs */
572#define SSL_OP_EPHEMERAL_RSA 0x00200000L
573/* Set on servers to choose the cipher according to the server's 554/* Set on servers to choose the cipher according to the server's
574 * preferences */ 555 * preferences */
575#define SSL_OP_CIPHER_SERVER_PREFERENCE 0x00400000L 556#define SSL_OP_CIPHER_SERVER_PREFERENCE 0x00400000L
@@ -585,18 +566,30 @@ struct ssl_session_st {
585#define SSL_OP_NO_TLSv1_2 0x08000000L 566#define SSL_OP_NO_TLSv1_2 0x08000000L
586#define SSL_OP_NO_TLSv1_1 0x10000000L 567#define SSL_OP_NO_TLSv1_1 0x10000000L
587 568
588/* Obsolete flags kept for compatibility. No sane code should use them. */
589#define SSL_OP_PKCS1_CHECK_1 0x0
590#define SSL_OP_PKCS1_CHECK_2 0x0
591
592#define SSL_OP_NETSCAPE_CA_DN_BUG 0x20000000L
593#define SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG 0x40000000L
594/* Make server add server-hello extension from early version of 569/* Make server add server-hello extension from early version of
595 * cryptopro draft, when GOST ciphersuite is negotiated. 570 * cryptopro draft, when GOST ciphersuite is negotiated.
596 * Required for interoperability with CryptoPro CSP 3.x 571 * Required for interoperability with CryptoPro CSP 3.x
597 */ 572 */
598#define SSL_OP_CRYPTOPRO_TLSEXT_BUG 0x80000000L 573#define SSL_OP_CRYPTOPRO_TLSEXT_BUG 0x80000000L
599 574
575/* SSL_OP_ALL: various bug workarounds that should be rather harmless.
576 * This used to be 0x000FFFFFL before 0.9.7. */
577#define SSL_OP_ALL 0x80000374L
578
579/* Obsolete flags kept for compatibility. No sane code should use them. */
580#define SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION 0x0
581#define SSL_OP_EPHEMERAL_RSA 0x0
582#define SSL_OP_MICROSOFT_SESS_ID_BUG 0x0
583#define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x0
584#define SSL_OP_NETSCAPE_CA_DN_BUG 0x0
585#define SSL_OP_NETSCAPE_CHALLENGE_BUG 0x0
586#define SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG 0x0
587#define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x0
588#define SSL_OP_PKCS1_CHECK_1 0x0
589#define SSL_OP_PKCS1_CHECK_2 0x0
590#define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x0
591#define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x0
592
600/* Allow SSL_write(..., n) to return r with 0 < r < n (i.e. report success 593/* Allow SSL_write(..., n) to return r with 0 < r < n (i.e. report success
601 * when just a single record has been written): */ 594 * when just a single record has been written): */
602#define SSL_MODE_ENABLE_PARTIAL_WRITE 0x00000001L 595#define SSL_MODE_ENABLE_PARTIAL_WRITE 0x00000001L