diff options
Diffstat (limited to 'src/lib/libssl/d1_clnt.c')
-rw-r--r-- | src/lib/libssl/d1_clnt.c | 12 |
1 files changed, 0 insertions, 12 deletions
diff --git a/src/lib/libssl/d1_clnt.c b/src/lib/libssl/d1_clnt.c index 3f159eed26..1ad65ba541 100644 --- a/src/lib/libssl/d1_clnt.c +++ b/src/lib/libssl/d1_clnt.c | |||
@@ -925,10 +925,8 @@ dtls1_send_client_key_exchange(SSL *s) | |||
925 | unsigned char *p, *d; | 925 | unsigned char *p, *d; |
926 | int n; | 926 | int n; |
927 | unsigned long alg_k; | 927 | unsigned long alg_k; |
928 | #ifndef OPENSSL_NO_RSA | ||
929 | unsigned char *q; | 928 | unsigned char *q; |
930 | EVP_PKEY *pkey = NULL; | 929 | EVP_PKEY *pkey = NULL; |
931 | #endif | ||
932 | #ifndef OPENSSL_NO_KRB5 | 930 | #ifndef OPENSSL_NO_KRB5 |
933 | KSSL_ERR kssl_err; | 931 | KSSL_ERR kssl_err; |
934 | #endif /* OPENSSL_NO_KRB5 */ | 932 | #endif /* OPENSSL_NO_KRB5 */ |
@@ -950,7 +948,6 @@ dtls1_send_client_key_exchange(SSL *s) | |||
950 | /* Fool emacs indentation */ | 948 | /* Fool emacs indentation */ |
951 | if (0) { | 949 | if (0) { |
952 | } | 950 | } |
953 | #ifndef OPENSSL_NO_RSA | ||
954 | else if (alg_k & SSL_kRSA) { | 951 | else if (alg_k & SSL_kRSA) { |
955 | RSA *rsa; | 952 | RSA *rsa; |
956 | unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; | 953 | unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; |
@@ -1005,7 +1002,6 @@ dtls1_send_client_key_exchange(SSL *s) | |||
1005 | tmp_buf, sizeof tmp_buf); | 1002 | tmp_buf, sizeof tmp_buf); |
1006 | OPENSSL_cleanse(tmp_buf, sizeof tmp_buf); | 1003 | OPENSSL_cleanse(tmp_buf, sizeof tmp_buf); |
1007 | } | 1004 | } |
1008 | #endif | ||
1009 | #ifndef OPENSSL_NO_KRB5 | 1005 | #ifndef OPENSSL_NO_KRB5 |
1010 | else if (alg_k & SSL_kKRB5) { | 1006 | else if (alg_k & SSL_kKRB5) { |
1011 | krb5_error_code krb5rc; | 1007 | krb5_error_code krb5rc; |
@@ -1474,13 +1470,9 @@ dtls1_send_client_verify(SSL *s) | |||
1474 | unsigned char *p, *d; | 1470 | unsigned char *p, *d; |
1475 | unsigned char data[MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH]; | 1471 | unsigned char data[MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH]; |
1476 | EVP_PKEY *pkey; | 1472 | EVP_PKEY *pkey; |
1477 | #ifndef OPENSSL_NO_RSA | ||
1478 | unsigned u = 0; | 1473 | unsigned u = 0; |
1479 | #endif | ||
1480 | unsigned long n; | 1474 | unsigned long n; |
1481 | #if !defined(OPENSSL_NO_DSA) || !defined(OPENSSL_NO_ECDSA) | ||
1482 | int j; | 1475 | int j; |
1483 | #endif | ||
1484 | 1476 | ||
1485 | if (s->state == SSL3_ST_CW_CERT_VRFY_A) { | 1477 | if (s->state == SSL3_ST_CW_CERT_VRFY_A) { |
1486 | d = (unsigned char *)s->init_buf->data; | 1478 | d = (unsigned char *)s->init_buf->data; |
@@ -1490,7 +1482,6 @@ dtls1_send_client_verify(SSL *s) | |||
1490 | s->method->ssl3_enc->cert_verify_mac(s, NID_sha1, | 1482 | s->method->ssl3_enc->cert_verify_mac(s, NID_sha1, |
1491 | &(data[MD5_DIGEST_LENGTH])); | 1483 | &(data[MD5_DIGEST_LENGTH])); |
1492 | 1484 | ||
1493 | #ifndef OPENSSL_NO_RSA | ||
1494 | if (pkey->type == EVP_PKEY_RSA) { | 1485 | if (pkey->type == EVP_PKEY_RSA) { |
1495 | s->method->ssl3_enc->cert_verify_mac(s, | 1486 | s->method->ssl3_enc->cert_verify_mac(s, |
1496 | NID_md5, &(data[0])); | 1487 | NID_md5, &(data[0])); |
@@ -1503,8 +1494,6 @@ dtls1_send_client_verify(SSL *s) | |||
1503 | s2n(u, p); | 1494 | s2n(u, p); |
1504 | n = u + 2; | 1495 | n = u + 2; |
1505 | } else | 1496 | } else |
1506 | #endif | ||
1507 | #ifndef OPENSSL_NO_DSA | ||
1508 | if (pkey->type == EVP_PKEY_DSA) { | 1497 | if (pkey->type == EVP_PKEY_DSA) { |
1509 | if (!DSA_sign(pkey->save_type, | 1498 | if (!DSA_sign(pkey->save_type, |
1510 | &(data[MD5_DIGEST_LENGTH]), | 1499 | &(data[MD5_DIGEST_LENGTH]), |
@@ -1516,7 +1505,6 @@ dtls1_send_client_verify(SSL *s) | |||
1516 | s2n(j, p); | 1505 | s2n(j, p); |
1517 | n = j + 2; | 1506 | n = j + 2; |
1518 | } else | 1507 | } else |
1519 | #endif | ||
1520 | #ifndef OPENSSL_NO_ECDSA | 1508 | #ifndef OPENSSL_NO_ECDSA |
1521 | if (pkey->type == EVP_PKEY_EC) { | 1509 | if (pkey->type == EVP_PKEY_EC) { |
1522 | if (!ECDSA_sign(pkey->save_type, | 1510 | if (!ECDSA_sign(pkey->save_type, |