summaryrefslogtreecommitdiff
path: root/src/lib/libssl/d1_clnt.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/d1_clnt.c')
-rw-r--r--src/lib/libssl/d1_clnt.c12
1 files changed, 0 insertions, 12 deletions
diff --git a/src/lib/libssl/d1_clnt.c b/src/lib/libssl/d1_clnt.c
index 3f159eed26..1ad65ba541 100644
--- a/src/lib/libssl/d1_clnt.c
+++ b/src/lib/libssl/d1_clnt.c
@@ -925,10 +925,8 @@ dtls1_send_client_key_exchange(SSL *s)
925 unsigned char *p, *d; 925 unsigned char *p, *d;
926 int n; 926 int n;
927 unsigned long alg_k; 927 unsigned long alg_k;
928#ifndef OPENSSL_NO_RSA
929 unsigned char *q; 928 unsigned char *q;
930 EVP_PKEY *pkey = NULL; 929 EVP_PKEY *pkey = NULL;
931#endif
932#ifndef OPENSSL_NO_KRB5 930#ifndef OPENSSL_NO_KRB5
933 KSSL_ERR kssl_err; 931 KSSL_ERR kssl_err;
934#endif /* OPENSSL_NO_KRB5 */ 932#endif /* OPENSSL_NO_KRB5 */
@@ -950,7 +948,6 @@ dtls1_send_client_key_exchange(SSL *s)
950 /* Fool emacs indentation */ 948 /* Fool emacs indentation */
951 if (0) { 949 if (0) {
952 } 950 }
953#ifndef OPENSSL_NO_RSA
954 else if (alg_k & SSL_kRSA) { 951 else if (alg_k & SSL_kRSA) {
955 RSA *rsa; 952 RSA *rsa;
956 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; 953 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH];
@@ -1005,7 +1002,6 @@ dtls1_send_client_key_exchange(SSL *s)
1005 tmp_buf, sizeof tmp_buf); 1002 tmp_buf, sizeof tmp_buf);
1006 OPENSSL_cleanse(tmp_buf, sizeof tmp_buf); 1003 OPENSSL_cleanse(tmp_buf, sizeof tmp_buf);
1007 } 1004 }
1008#endif
1009#ifndef OPENSSL_NO_KRB5 1005#ifndef OPENSSL_NO_KRB5
1010 else if (alg_k & SSL_kKRB5) { 1006 else if (alg_k & SSL_kKRB5) {
1011 krb5_error_code krb5rc; 1007 krb5_error_code krb5rc;
@@ -1474,13 +1470,9 @@ dtls1_send_client_verify(SSL *s)
1474 unsigned char *p, *d; 1470 unsigned char *p, *d;
1475 unsigned char data[MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH]; 1471 unsigned char data[MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH];
1476 EVP_PKEY *pkey; 1472 EVP_PKEY *pkey;
1477#ifndef OPENSSL_NO_RSA
1478 unsigned u = 0; 1473 unsigned u = 0;
1479#endif
1480 unsigned long n; 1474 unsigned long n;
1481#if !defined(OPENSSL_NO_DSA) || !defined(OPENSSL_NO_ECDSA)
1482 int j; 1475 int j;
1483#endif
1484 1476
1485 if (s->state == SSL3_ST_CW_CERT_VRFY_A) { 1477 if (s->state == SSL3_ST_CW_CERT_VRFY_A) {
1486 d = (unsigned char *)s->init_buf->data; 1478 d = (unsigned char *)s->init_buf->data;
@@ -1490,7 +1482,6 @@ dtls1_send_client_verify(SSL *s)
1490 s->method->ssl3_enc->cert_verify_mac(s, NID_sha1, 1482 s->method->ssl3_enc->cert_verify_mac(s, NID_sha1,
1491 &(data[MD5_DIGEST_LENGTH])); 1483 &(data[MD5_DIGEST_LENGTH]));
1492 1484
1493#ifndef OPENSSL_NO_RSA
1494 if (pkey->type == EVP_PKEY_RSA) { 1485 if (pkey->type == EVP_PKEY_RSA) {
1495 s->method->ssl3_enc->cert_verify_mac(s, 1486 s->method->ssl3_enc->cert_verify_mac(s,
1496 NID_md5, &(data[0])); 1487 NID_md5, &(data[0]));
@@ -1503,8 +1494,6 @@ dtls1_send_client_verify(SSL *s)
1503 s2n(u, p); 1494 s2n(u, p);
1504 n = u + 2; 1495 n = u + 2;
1505 } else 1496 } else
1506#endif
1507#ifndef OPENSSL_NO_DSA
1508 if (pkey->type == EVP_PKEY_DSA) { 1497 if (pkey->type == EVP_PKEY_DSA) {
1509 if (!DSA_sign(pkey->save_type, 1498 if (!DSA_sign(pkey->save_type,
1510 &(data[MD5_DIGEST_LENGTH]), 1499 &(data[MD5_DIGEST_LENGTH]),
@@ -1516,7 +1505,6 @@ dtls1_send_client_verify(SSL *s)
1516 s2n(j, p); 1505 s2n(j, p);
1517 n = j + 2; 1506 n = j + 2;
1518 } else 1507 } else
1519#endif
1520#ifndef OPENSSL_NO_ECDSA 1508#ifndef OPENSSL_NO_ECDSA
1521 if (pkey->type == EVP_PKEY_EC) { 1509 if (pkey->type == EVP_PKEY_EC) {
1522 if (!ECDSA_sign(pkey->save_type, 1510 if (!ECDSA_sign(pkey->save_type,