summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorjsing <>2018-06-02 16:29:01 +0000
committerjsing <>2018-06-02 16:29:01 +0000
commitcd126e741290f084546caeabdc425a5878244043 (patch)
tree03105b3a30a1d556ff0c365a3888a4253c057c0f /src
parentbe2eb562a3b6b24f6f7bf2a5fe7b2fbce5209289 (diff)
downloadopenbsd-cd126e741290f084546caeabdc425a5878244043.tar.gz
openbsd-cd126e741290f084546caeabdc425a5878244043.tar.bz2
openbsd-cd126e741290f084546caeabdc425a5878244043.zip
Remove the three remaining single DES cipher suites.
These are insecure and should not be used - furthermore, we would should not have been allowing their negotiation with TLSv1.2 (as noted by Robert Merget, Juraj Somorovsky and Simon Friedberger). Removing these cipher suites also fixes this issue. ok beck@ inoguchi@
Diffstat (limited to 'src')
-rw-r--r--src/lib/libssl/s3_lib.c50
1 files changed, 1 insertions, 49 deletions
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c
index aa430ee971..b3162ff657 100644
--- a/src/lib/libssl/s3_lib.c
+++ b/src/lib/libssl/s3_lib.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: s3_lib.c,v 1.166 2018/04/07 16:55:13 jsing Exp $ */ 1/* $OpenBSD: s3_lib.c,v 1.167 2018/06/02 16:29:01 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -237,22 +237,6 @@ SSL_CIPHER ssl3_ciphers[] = {
237 .alg_bits = 128, 237 .alg_bits = 128,
238 }, 238 },
239 239
240 /* Cipher 09 */
241 {
242 .valid = 1,
243 .name = SSL3_TXT_RSA_DES_64_CBC_SHA,
244 .id = SSL3_CK_RSA_DES_64_CBC_SHA,
245 .algorithm_mkey = SSL_kRSA,
246 .algorithm_auth = SSL_aRSA,
247 .algorithm_enc = SSL_DES,
248 .algorithm_mac = SSL_SHA1,
249 .algorithm_ssl = SSL_SSLV3,
250 .algo_strength = SSL_LOW,
251 .algorithm2 = SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF,
252 .strength_bits = 56,
253 .alg_bits = 56,
254 },
255
256 /* Cipher 0A */ 240 /* Cipher 0A */
257 { 241 {
258 .valid = 1, 242 .valid = 1,
@@ -273,22 +257,6 @@ SSL_CIPHER ssl3_ciphers[] = {
273 * Ephemeral DH (DHE) ciphers. 257 * Ephemeral DH (DHE) ciphers.
274 */ 258 */
275 259
276 /* Cipher 15 */
277 {
278 .valid = 1,
279 .name = SSL3_TXT_EDH_RSA_DES_64_CBC_SHA,
280 .id = SSL3_CK_EDH_RSA_DES_64_CBC_SHA,
281 .algorithm_mkey = SSL_kDHE,
282 .algorithm_auth = SSL_aRSA,
283 .algorithm_enc = SSL_DES,
284 .algorithm_mac = SSL_SHA1,
285 .algorithm_ssl = SSL_SSLV3,
286 .algo_strength = SSL_LOW,
287 .algorithm2 = SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF,
288 .strength_bits = 56,
289 .alg_bits = 56,
290 },
291
292 /* Cipher 16 */ 260 /* Cipher 16 */
293 { 261 {
294 .valid = 1, 262 .valid = 1,
@@ -321,22 +289,6 @@ SSL_CIPHER ssl3_ciphers[] = {
321 .alg_bits = 128, 289 .alg_bits = 128,
322 }, 290 },
323 291
324 /* Cipher 1A */
325 {
326 .valid = 1,
327 .name = SSL3_TXT_ADH_DES_64_CBC_SHA,
328 .id = SSL3_CK_ADH_DES_64_CBC_SHA,
329 .algorithm_mkey = SSL_kDHE,
330 .algorithm_auth = SSL_aNULL,
331 .algorithm_enc = SSL_DES,
332 .algorithm_mac = SSL_SHA1,
333 .algorithm_ssl = SSL_SSLV3,
334 .algo_strength = SSL_LOW,
335 .algorithm2 = SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF,
336 .strength_bits = 56,
337 .alg_bits = 56,
338 },
339
340 /* Cipher 1B */ 292 /* Cipher 1B */
341 { 293 {
342 .valid = 1, 294 .valid = 1,