diff options
| -rw-r--r-- | src/lib/libssl/src/apps/s_client.c | 9 | ||||
| -rw-r--r-- | src/lib/libssl/src/apps/s_server.c | 32 |
2 files changed, 0 insertions, 41 deletions
diff --git a/src/lib/libssl/src/apps/s_client.c b/src/lib/libssl/src/apps/s_client.c index e409589eb4..3dc613ebc2 100644 --- a/src/lib/libssl/src/apps/s_client.c +++ b/src/lib/libssl/src/apps/s_client.c | |||
| @@ -418,9 +418,6 @@ s_client_main(int argc, char **argv) | |||
| 418 | { | 418 | { |
| 419 | unsigned int off = 0, clr = 0; | 419 | unsigned int off = 0, clr = 0; |
| 420 | SSL *con = NULL; | 420 | SSL *con = NULL; |
| 421 | #ifndef OPENSSL_NO_KRB5 | ||
| 422 | KSSL_CTX *kctx; | ||
| 423 | #endif | ||
| 424 | int s, k, width, state = 0, af = AF_UNSPEC; | 421 | int s, k, width, state = 0, af = AF_UNSPEC; |
| 425 | char *cbuf = NULL, *sbuf = NULL, *mbuf = NULL; | 422 | char *cbuf = NULL, *sbuf = NULL, *mbuf = NULL; |
| 426 | int cbuf_len, cbuf_off; | 423 | int cbuf_len, cbuf_off; |
| @@ -963,12 +960,6 @@ bad: | |||
| 963 | } | 960 | } |
| 964 | } | 961 | } |
| 965 | #endif | 962 | #endif |
| 966 | #ifndef OPENSSL_NO_KRB5 | ||
| 967 | if (con && (kctx = kssl_ctx_new()) != NULL) { | ||
| 968 | SSL_set0_kssl_ctx(con, kctx); | ||
| 969 | kssl_ctx_setstring(kctx, KSSL_SERVER, host); | ||
| 970 | } | ||
| 971 | #endif /* OPENSSL_NO_KRB5 */ | ||
| 972 | /* SSL_set_cipher_list(con,"RC4-MD5"); */ | 963 | /* SSL_set_cipher_list(con,"RC4-MD5"); */ |
| 973 | #if 0 | 964 | #if 0 |
| 974 | #ifdef TLSEXT_TYPE_opaque_prf_input | 965 | #ifdef TLSEXT_TYPE_opaque_prf_input |
diff --git a/src/lib/libssl/src/apps/s_server.c b/src/lib/libssl/src/apps/s_server.c index 22e3c18ada..c34816749a 100644 --- a/src/lib/libssl/src/apps/s_server.c +++ b/src/lib/libssl/src/apps/s_server.c | |||
| @@ -1557,9 +1557,6 @@ sv_body(char *hostname, int s, unsigned char *context) | |||
| 1557 | unsigned long l; | 1557 | unsigned long l; |
| 1558 | SSL *con = NULL; | 1558 | SSL *con = NULL; |
| 1559 | BIO *sbio; | 1559 | BIO *sbio; |
| 1560 | #ifndef OPENSSL_NO_KRB5 | ||
| 1561 | KSSL_CTX *kctx; | ||
| 1562 | #endif | ||
| 1563 | struct timeval timeout; | 1560 | struct timeval timeout; |
| 1564 | struct timeval *timeoutp; | 1561 | struct timeval *timeoutp; |
| 1565 | 1562 | ||
| @@ -1589,13 +1586,6 @@ sv_body(char *hostname, int s, unsigned char *context) | |||
| 1589 | SSL_CTX_set_tlsext_status_arg(ctx, &tlscstatp); | 1586 | SSL_CTX_set_tlsext_status_arg(ctx, &tlscstatp); |
| 1590 | } | 1587 | } |
| 1591 | #endif | 1588 | #endif |
| 1592 | #ifndef OPENSSL_NO_KRB5 | ||
| 1593 | if ((kctx = kssl_ctx_new()) != NULL) { | ||
| 1594 | SSL_set0_kssl_ctx(con, kctx); | ||
| 1595 | kssl_ctx_setstring(kctx, KSSL_SERVICE, KRB5SVC); | ||
| 1596 | kssl_ctx_setstring(kctx, KSSL_KEYTAB, KRB5KEYTAB); | ||
| 1597 | } | ||
| 1598 | #endif /* OPENSSL_NO_KRB5 */ | ||
| 1599 | if (context) | 1589 | if (context) |
| 1600 | SSL_set_session_id_context(con, context, | 1590 | SSL_set_session_id_context(con, context, |
| 1601 | strlen((char *) context)); | 1591 | strlen((char *) context)); |
| @@ -1885,9 +1875,6 @@ init_ssl_connection(SSL * con) | |||
| 1885 | X509 *peer; | 1875 | X509 *peer; |
| 1886 | long verify_error; | 1876 | long verify_error; |
| 1887 | char buf[BUFSIZ]; | 1877 | char buf[BUFSIZ]; |
| 1888 | #ifndef OPENSSL_NO_KRB5 | ||
| 1889 | char *client_princ; | ||
| 1890 | #endif | ||
| 1891 | #if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG) | 1878 | #if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG) |
| 1892 | const unsigned char *next_proto_neg; | 1879 | const unsigned char *next_proto_neg; |
| 1893 | unsigned next_proto_neg_len; | 1880 | unsigned next_proto_neg_len; |
| @@ -1951,13 +1938,6 @@ init_ssl_connection(SSL * con) | |||
| 1951 | TLS1_FLAGS_TLS_PADDING_BUG) | 1938 | TLS1_FLAGS_TLS_PADDING_BUG) |
| 1952 | BIO_printf(bio_s_out, | 1939 | BIO_printf(bio_s_out, |
| 1953 | "Peer has incorrect TLSv1 block padding\n"); | 1940 | "Peer has incorrect TLSv1 block padding\n"); |
| 1954 | #ifndef OPENSSL_NO_KRB5 | ||
| 1955 | client_princ = kssl_ctx_get0_client_princ(SSL_get0_kssl_ctx(con)); | ||
| 1956 | if (client_princ != NULL) { | ||
| 1957 | BIO_printf(bio_s_out, "Kerberos peer principal is %s\n", | ||
| 1958 | client_princ); | ||
| 1959 | } | ||
| 1960 | #endif /* OPENSSL_NO_KRB5 */ | ||
| 1961 | BIO_printf(bio_s_out, "Secure Renegotiation IS%s supported\n", | 1941 | BIO_printf(bio_s_out, "Secure Renegotiation IS%s supported\n", |
| 1962 | SSL_get_secure_renegotiation_support(con) ? "" : " NOT"); | 1942 | SSL_get_secure_renegotiation_support(con) ? "" : " NOT"); |
| 1963 | if (keymatexportlabel != NULL) { | 1943 | if (keymatexportlabel != NULL) { |
| @@ -2002,9 +1982,6 @@ err: | |||
| 2002 | return (ret); | 1982 | return (ret); |
| 2003 | } | 1983 | } |
| 2004 | #endif | 1984 | #endif |
| 2005 | #ifndef OPENSSL_NO_KRB5 | ||
| 2006 | char *client_princ; | ||
| 2007 | #endif | ||
| 2008 | 1985 | ||
| 2009 | #if 0 | 1986 | #if 0 |
| 2010 | static int | 1987 | static int |
| @@ -2037,9 +2014,6 @@ www_body(char *hostname, int s, unsigned char *context) | |||
| 2037 | SSL *con; | 2014 | SSL *con; |
| 2038 | const SSL_CIPHER *c; | 2015 | const SSL_CIPHER *c; |
| 2039 | BIO *io, *ssl_bio, *sbio; | 2016 | BIO *io, *ssl_bio, *sbio; |
| 2040 | #ifndef OPENSSL_NO_KRB5 | ||
| 2041 | KSSL_CTX *kctx; | ||
| 2042 | #endif | ||
| 2043 | 2017 | ||
| 2044 | buf = malloc(bufsize); | 2018 | buf = malloc(bufsize); |
| 2045 | if (buf == NULL) | 2019 | if (buf == NULL) |
| @@ -2070,12 +2044,6 @@ www_body(char *hostname, int s, unsigned char *context) | |||
| 2070 | SSL_set_tlsext_debug_arg(con, bio_s_out); | 2044 | SSL_set_tlsext_debug_arg(con, bio_s_out); |
| 2071 | } | 2045 | } |
| 2072 | #endif | 2046 | #endif |
| 2073 | #ifndef OPENSSL_NO_KRB5 | ||
| 2074 | if ((kctx = kssl_ctx_new()) != NULL) { | ||
| 2075 | kssl_ctx_setstring(kctx, KSSL_SERVICE, KRB5SVC); | ||
| 2076 | kssl_ctx_setstring(kctx, KSSL_KEYTAB, KRB5KEYTAB); | ||
| 2077 | } | ||
| 2078 | #endif /* OPENSSL_NO_KRB5 */ | ||
| 2079 | if (context) | 2047 | if (context) |
| 2080 | SSL_set_session_id_context(con, context, | 2048 | SSL_set_session_id_context(con, context, |
| 2081 | strlen((char *) context)); | 2049 | strlen((char *) context)); |
