summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_srvr.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/s3_srvr.c')
-rw-r--r--src/lib/libssl/s3_srvr.c16
1 files changed, 0 insertions, 16 deletions
diff --git a/src/lib/libssl/s3_srvr.c b/src/lib/libssl/s3_srvr.c
index 927b0d7db1..19e0495fe6 100644
--- a/src/lib/libssl/s3_srvr.c
+++ b/src/lib/libssl/s3_srvr.c
@@ -1554,13 +1554,11 @@ ssl3_send_server_done(SSL *s)
1554int 1554int
1555ssl3_send_server_key_exchange(SSL *s) 1555ssl3_send_server_key_exchange(SSL *s)
1556{ 1556{
1557#ifndef OPENSSL_NO_RSA
1558 unsigned char *q; 1557 unsigned char *q;
1559 int j, num; 1558 int j, num;
1560 RSA *rsa; 1559 RSA *rsa;
1561 unsigned char md_buf[MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH]; 1560 unsigned char md_buf[MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH];
1562 unsigned int u; 1561 unsigned int u;
1563#endif
1564#ifndef OPENSSL_NO_DH 1562#ifndef OPENSSL_NO_DH
1565 DH *dh = NULL, *dhp; 1563 DH *dh = NULL, *dhp;
1566#endif 1564#endif
@@ -1596,7 +1594,6 @@ ssl3_send_server_key_exchange(SSL *s)
1596 1594
1597 r[0] = r[1] = r[2] = r[3] = NULL; 1595 r[0] = r[1] = r[2] = r[3] = NULL;
1598 n = 0; 1596 n = 0;
1599#ifndef OPENSSL_NO_RSA
1600 if (type & SSL_kRSA) { 1597 if (type & SSL_kRSA) {
1601 rsa = cert->rsa_tmp; 1598 rsa = cert->rsa_tmp;
1602 if ((rsa == NULL) && (s->cert->rsa_tmp_cb != NULL)) { 1599 if ((rsa == NULL) && (s->cert->rsa_tmp_cb != NULL)) {
@@ -1623,7 +1620,6 @@ ssl3_send_server_key_exchange(SSL *s)
1623 r[1] = rsa->e; 1620 r[1] = rsa->e;
1624 s->s3->tmp.use_rsa_tmp = 1; 1621 s->s3->tmp.use_rsa_tmp = 1;
1625 } else 1622 } else
1626#endif
1627#ifndef OPENSSL_NO_DH 1623#ifndef OPENSSL_NO_DH
1628 if (type & SSL_kEDH) { 1624 if (type & SSL_kEDH) {
1629 dhp = cert->dh_tmp; 1625 dhp = cert->dh_tmp;
@@ -1913,7 +1909,6 @@ ssl3_send_server_key_exchange(SSL *s)
1913 * n is the length of the params, they start at &(d[4]) 1909 * n is the length of the params, they start at &(d[4])
1914 * and p points to the space at the end. 1910 * and p points to the space at the end.
1915 */ 1911 */
1916#ifndef OPENSSL_NO_RSA
1917 if (pkey->type == EVP_PKEY_RSA 1912 if (pkey->type == EVP_PKEY_RSA
1918 && TLS1_get_version(s) < TLS1_2_VERSION) { 1913 && TLS1_get_version(s) < TLS1_2_VERSION) {
1919 q = md_buf; 1914 q = md_buf;
@@ -1946,7 +1941,6 @@ ssl3_send_server_key_exchange(SSL *s)
1946 s2n(u, p); 1941 s2n(u, p);
1947 n += u + 2; 1942 n += u + 2;
1948 } else 1943 } else
1949#endif
1950 if (md) { 1944 if (md) {
1951 /* 1945 /*
1952 * For TLS1.2 and later send signature 1946 * For TLS1.2 and later send signature
@@ -2120,10 +2114,8 @@ ssl3_get_client_key_exchange(SSL *s)
2120 long n; 2114 long n;
2121 unsigned long alg_k; 2115 unsigned long alg_k;
2122 unsigned char *p; 2116 unsigned char *p;
2123#ifndef OPENSSL_NO_RSA
2124 RSA *rsa = NULL; 2117 RSA *rsa = NULL;
2125 EVP_PKEY *pkey = NULL; 2118 EVP_PKEY *pkey = NULL;
2126#endif
2127#ifndef OPENSSL_NO_DH 2119#ifndef OPENSSL_NO_DH
2128 BIGNUM *pub = NULL; 2120 BIGNUM *pub = NULL;
2129 DH *dh_srvr; 2121 DH *dh_srvr;
@@ -2149,7 +2141,6 @@ ssl3_get_client_key_exchange(SSL *s)
2149 2141
2150 alg_k = s->s3->tmp.new_cipher->algorithm_mkey; 2142 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
2151 2143
2152#ifndef OPENSSL_NO_RSA
2153 if (alg_k & SSL_kRSA) { 2144 if (alg_k & SSL_kRSA) {
2154 /* FIX THIS UP EAY EAY EAY EAY */ 2145 /* FIX THIS UP EAY EAY EAY EAY */
2155 if (s->s3->tmp.use_rsa_tmp) { 2146 if (s->s3->tmp.use_rsa_tmp) {
@@ -2259,7 +2250,6 @@ ssl3_get_client_key_exchange(SSL *s)
2259 p, i); 2250 p, i);
2260 OPENSSL_cleanse(p, i); 2251 OPENSSL_cleanse(p, i);
2261 } else 2252 } else
2262#endif
2263#ifndef OPENSSL_NO_DH 2253#ifndef OPENSSL_NO_DH
2264 if (alg_k & (SSL_kEDH|SSL_kDHr|SSL_kDHd)) { 2254 if (alg_k & (SSL_kEDH|SSL_kDHr|SSL_kDHd)) {
2265 n2s(p, i); 2255 n2s(p, i);
@@ -2851,9 +2841,7 @@ ssl3_get_client_key_exchange(SSL *s)
2851 return (1); 2841 return (1);
2852f_err: 2842f_err:
2853 ssl3_send_alert(s, SSL3_AL_FATAL, al); 2843 ssl3_send_alert(s, SSL3_AL_FATAL, al);
2854#if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_RSA) || !defined(OPENSSL_NO_ECDH) || defined(OPENSSL_NO_SRP)
2855err: 2844err:
2856#endif
2857#ifndef OPENSSL_NO_ECDH 2845#ifndef OPENSSL_NO_ECDH
2858 EVP_PKEY_free(clnt_pub_pkey); 2846 EVP_PKEY_free(clnt_pub_pkey);
2859 EC_POINT_free(clnt_ecpoint); 2847 EC_POINT_free(clnt_ecpoint);
@@ -3010,7 +2998,6 @@ ssl3_get_cert_verify(SSL *s)
3010 goto f_err; 2998 goto f_err;
3011 } 2999 }
3012 } else 3000 } else
3013#ifndef OPENSSL_NO_RSA
3014 if (pkey->type == EVP_PKEY_RSA) { 3001 if (pkey->type == EVP_PKEY_RSA) {
3015 i = RSA_verify(NID_md5_sha1, s->s3->tmp.cert_verify_md, 3002 i = RSA_verify(NID_md5_sha1, s->s3->tmp.cert_verify_md,
3016 MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH, p, i, 3003 MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH, p, i,
@@ -3028,8 +3015,6 @@ ssl3_get_cert_verify(SSL *s)
3028 goto f_err; 3015 goto f_err;
3029 } 3016 }
3030 } else 3017 } else
3031#endif
3032#ifndef OPENSSL_NO_DSA
3033 if (pkey->type == EVP_PKEY_DSA) { 3018 if (pkey->type == EVP_PKEY_DSA) {
3034 j = DSA_verify(pkey->save_type, 3019 j = DSA_verify(pkey->save_type,
3035 &(s->s3->tmp.cert_verify_md[MD5_DIGEST_LENGTH]), 3020 &(s->s3->tmp.cert_verify_md[MD5_DIGEST_LENGTH]),
@@ -3042,7 +3027,6 @@ ssl3_get_cert_verify(SSL *s)
3042 goto f_err; 3027 goto f_err;
3043 } 3028 }
3044 } else 3029 } else
3045#endif
3046#ifndef OPENSSL_NO_ECDSA 3030#ifndef OPENSSL_NO_ECDSA
3047 if (pkey->type == EVP_PKEY_EC) { 3031 if (pkey->type == EVP_PKEY_EC) {
3048 j = ECDSA_verify(pkey->save_type, 3032 j = ECDSA_verify(pkey->save_type,