summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorjsing <>2014-07-10 10:09:54 +0000
committerjsing <>2014-07-10 10:09:54 +0000
commite55b3f9b10908408bebfb52f2d8a6b98b9814add (patch)
treea3ae9a1ee6ac2322bc9543b358593d2c2bd98f16 /src
parent4c842635fbe2aa61878226cb3083d6d178062524 (diff)
downloadopenbsd-e55b3f9b10908408bebfb52f2d8a6b98b9814add.tar.gz
openbsd-e55b3f9b10908408bebfb52f2d8a6b98b9814add.tar.bz2
openbsd-e55b3f9b10908408bebfb52f2d8a6b98b9814add.zip
Remove more compression related code.
Diffstat (limited to 'src')
-rw-r--r--src/lib/libssl/src/ssl/ssl_ciph.c11
-rw-r--r--src/lib/libssl/src/ssl/ssl_locl.h3
-rw-r--r--src/lib/libssl/src/ssl/t1_enc.c9
-rw-r--r--src/lib/libssl/ssl_ciph.c11
-rw-r--r--src/lib/libssl/ssl_locl.h3
-rw-r--r--src/lib/libssl/t1_enc.c9
6 files changed, 6 insertions, 40 deletions
diff --git a/src/lib/libssl/src/ssl/ssl_ciph.c b/src/lib/libssl/src/ssl/ssl_ciph.c
index 05fa290edf..bcd9b500f4 100644
--- a/src/lib/libssl/src/ssl/ssl_ciph.c
+++ b/src/lib/libssl/src/ssl/ssl_ciph.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_ciph.c,v 1.60 2014/07/10 09:26:08 jsing Exp $ */ 1/* $OpenBSD: ssl_ciph.c,v 1.61 2014/07/10 10:09:54 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -641,15 +641,6 @@ ssl_load_ciphers(void)
641 EVP_MD_size(ssl_digest_methods[SSL_MD_SHA384_IDX]); 641 EVP_MD_size(ssl_digest_methods[SSL_MD_SHA384_IDX]);
642} 642}
643 643
644/* ssl_cipher_get_comp sets comp to the correct SSL_COMP for the given
645 * session and returns 1. On error it returns 0. */
646int
647ssl_cipher_get_comp(const SSL_SESSION *s, SSL_COMP **comp)
648{
649 *comp = NULL;
650 return 1;
651}
652
653int 644int
654ssl_cipher_get_evp(const SSL_SESSION *s, const EVP_CIPHER **enc, 645ssl_cipher_get_evp(const SSL_SESSION *s, const EVP_CIPHER **enc,
655 const EVP_MD **md, int *mac_pkey_type, int *mac_secret_size) 646 const EVP_MD **md, int *mac_pkey_type, int *mac_secret_size)
diff --git a/src/lib/libssl/src/ssl/ssl_locl.h b/src/lib/libssl/src/ssl/ssl_locl.h
index b3bc4f4ae4..150f56e1d6 100644
--- a/src/lib/libssl/src/ssl/ssl_locl.h
+++ b/src/lib/libssl/src/ssl/ssl_locl.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_locl.h,v 1.57 2014/07/10 08:51:15 tedu Exp $ */ 1/* $OpenBSD: ssl_locl.h,v 1.58 2014/07/10 10:09:54 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -579,7 +579,6 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_list(const SSL_METHOD *meth,
579 STACK_OF(SSL_CIPHER) **pref, STACK_OF(SSL_CIPHER) **sorted, 579 STACK_OF(SSL_CIPHER) **pref, STACK_OF(SSL_CIPHER) **sorted,
580 const char *rule_str); 580 const char *rule_str);
581void ssl_update_cache(SSL *s, int mode); 581void ssl_update_cache(SSL *s, int mode);
582int ssl_cipher_get_comp(const SSL_SESSION *s, SSL_COMP **comp);
583int ssl_cipher_get_evp(const SSL_SESSION *s, const EVP_CIPHER **enc, 582int ssl_cipher_get_evp(const SSL_SESSION *s, const EVP_CIPHER **enc,
584 const EVP_MD **md, int *mac_pkey_type, int *mac_secret_size); 583 const EVP_MD **md, int *mac_pkey_type, int *mac_secret_size);
585int ssl_cipher_get_evp_aead(const SSL_SESSION *s, const EVP_AEAD **aead); 584int ssl_cipher_get_evp_aead(const SSL_SESSION *s, const EVP_AEAD **aead);
diff --git a/src/lib/libssl/src/ssl/t1_enc.c b/src/lib/libssl/src/ssl/t1_enc.c
index cccf17eab5..e4b54691c6 100644
--- a/src/lib/libssl/src/ssl/t1_enc.c
+++ b/src/lib/libssl/src/ssl/t1_enc.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: t1_enc.c,v 1.66 2014/07/10 08:51:15 tedu Exp $ */ 1/* $OpenBSD: t1_enc.c,v 1.67 2014/07/10 10:09:54 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -568,18 +568,11 @@ tls1_setup_key_block(SSL *s)
568 const EVP_CIPHER *cipher = NULL; 568 const EVP_CIPHER *cipher = NULL;
569 const EVP_AEAD *aead = NULL; 569 const EVP_AEAD *aead = NULL;
570 const EVP_MD *mac = NULL; 570 const EVP_MD *mac = NULL;
571 SSL_COMP *comp;
572 int ret = 0; 571 int ret = 0;
573 572
574 if (s->s3->tmp.key_block_length != 0) 573 if (s->s3->tmp.key_block_length != 0)
575 return (1); 574 return (1);
576 575
577 if (!ssl_cipher_get_comp(s->session, &comp)) {
578 SSLerr(SSL_F_TLS1_SETUP_KEY_BLOCK,
579 SSL_R_CIPHER_COMPRESSION_UNAVAILABLE);
580 return (0);
581 }
582
583 if (s->session->cipher && 576 if (s->session->cipher &&
584 (s->session->cipher->algorithm2 & SSL_CIPHER_ALGORITHM2_AEAD)) { 577 (s->session->cipher->algorithm2 & SSL_CIPHER_ALGORITHM2_AEAD)) {
585 if (!ssl_cipher_get_evp_aead(s->session, &aead)) { 578 if (!ssl_cipher_get_evp_aead(s->session, &aead)) {
diff --git a/src/lib/libssl/ssl_ciph.c b/src/lib/libssl/ssl_ciph.c
index 05fa290edf..bcd9b500f4 100644
--- a/src/lib/libssl/ssl_ciph.c
+++ b/src/lib/libssl/ssl_ciph.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_ciph.c,v 1.60 2014/07/10 09:26:08 jsing Exp $ */ 1/* $OpenBSD: ssl_ciph.c,v 1.61 2014/07/10 10:09:54 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -641,15 +641,6 @@ ssl_load_ciphers(void)
641 EVP_MD_size(ssl_digest_methods[SSL_MD_SHA384_IDX]); 641 EVP_MD_size(ssl_digest_methods[SSL_MD_SHA384_IDX]);
642} 642}
643 643
644/* ssl_cipher_get_comp sets comp to the correct SSL_COMP for the given
645 * session and returns 1. On error it returns 0. */
646int
647ssl_cipher_get_comp(const SSL_SESSION *s, SSL_COMP **comp)
648{
649 *comp = NULL;
650 return 1;
651}
652
653int 644int
654ssl_cipher_get_evp(const SSL_SESSION *s, const EVP_CIPHER **enc, 645ssl_cipher_get_evp(const SSL_SESSION *s, const EVP_CIPHER **enc,
655 const EVP_MD **md, int *mac_pkey_type, int *mac_secret_size) 646 const EVP_MD **md, int *mac_pkey_type, int *mac_secret_size)
diff --git a/src/lib/libssl/ssl_locl.h b/src/lib/libssl/ssl_locl.h
index b3bc4f4ae4..150f56e1d6 100644
--- a/src/lib/libssl/ssl_locl.h
+++ b/src/lib/libssl/ssl_locl.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl_locl.h,v 1.57 2014/07/10 08:51:15 tedu Exp $ */ 1/* $OpenBSD: ssl_locl.h,v 1.58 2014/07/10 10:09:54 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -579,7 +579,6 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_list(const SSL_METHOD *meth,
579 STACK_OF(SSL_CIPHER) **pref, STACK_OF(SSL_CIPHER) **sorted, 579 STACK_OF(SSL_CIPHER) **pref, STACK_OF(SSL_CIPHER) **sorted,
580 const char *rule_str); 580 const char *rule_str);
581void ssl_update_cache(SSL *s, int mode); 581void ssl_update_cache(SSL *s, int mode);
582int ssl_cipher_get_comp(const SSL_SESSION *s, SSL_COMP **comp);
583int ssl_cipher_get_evp(const SSL_SESSION *s, const EVP_CIPHER **enc, 582int ssl_cipher_get_evp(const SSL_SESSION *s, const EVP_CIPHER **enc,
584 const EVP_MD **md, int *mac_pkey_type, int *mac_secret_size); 583 const EVP_MD **md, int *mac_pkey_type, int *mac_secret_size);
585int ssl_cipher_get_evp_aead(const SSL_SESSION *s, const EVP_AEAD **aead); 584int ssl_cipher_get_evp_aead(const SSL_SESSION *s, const EVP_AEAD **aead);
diff --git a/src/lib/libssl/t1_enc.c b/src/lib/libssl/t1_enc.c
index cccf17eab5..e4b54691c6 100644
--- a/src/lib/libssl/t1_enc.c
+++ b/src/lib/libssl/t1_enc.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: t1_enc.c,v 1.66 2014/07/10 08:51:15 tedu Exp $ */ 1/* $OpenBSD: t1_enc.c,v 1.67 2014/07/10 10:09:54 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -568,18 +568,11 @@ tls1_setup_key_block(SSL *s)
568 const EVP_CIPHER *cipher = NULL; 568 const EVP_CIPHER *cipher = NULL;
569 const EVP_AEAD *aead = NULL; 569 const EVP_AEAD *aead = NULL;
570 const EVP_MD *mac = NULL; 570 const EVP_MD *mac = NULL;
571 SSL_COMP *comp;
572 int ret = 0; 571 int ret = 0;
573 572
574 if (s->s3->tmp.key_block_length != 0) 573 if (s->s3->tmp.key_block_length != 0)
575 return (1); 574 return (1);
576 575
577 if (!ssl_cipher_get_comp(s->session, &comp)) {
578 SSLerr(SSL_F_TLS1_SETUP_KEY_BLOCK,
579 SSL_R_CIPHER_COMPRESSION_UNAVAILABLE);
580 return (0);
581 }
582
583 if (s->session->cipher && 576 if (s->session->cipher &&
584 (s->session->cipher->algorithm2 & SSL_CIPHER_ALGORITHM2_AEAD)) { 577 (s->session->cipher->algorithm2 & SSL_CIPHER_ALGORITHM2_AEAD)) {
585 if (!ssl_cipher_get_evp_aead(s->session, &aead)) { 578 if (!ssl_cipher_get_evp_aead(s->session, &aead)) {