diff options
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libssl/ssl_asn1.c | 66 |
1 files changed, 0 insertions, 66 deletions
diff --git a/src/lib/libssl/ssl_asn1.c b/src/lib/libssl/ssl_asn1.c index 1d2590268c..566590f171 100644 --- a/src/lib/libssl/ssl_asn1.c +++ b/src/lib/libssl/ssl_asn1.c | |||
| @@ -97,9 +97,6 @@ typedef struct ssl_session_asn1_st { | |||
| 97 | ASN1_OCTET_STRING master_key; | 97 | ASN1_OCTET_STRING master_key; |
| 98 | ASN1_OCTET_STRING session_id; | 98 | ASN1_OCTET_STRING session_id; |
| 99 | ASN1_OCTET_STRING session_id_context; | 99 | ASN1_OCTET_STRING session_id_context; |
| 100 | #ifndef OPENSSL_NO_KRB5 | ||
| 101 | ASN1_OCTET_STRING krb5_princ; | ||
| 102 | #endif /* OPENSSL_NO_KRB5 */ | ||
| 103 | ASN1_INTEGER time; | 100 | ASN1_INTEGER time; |
| 104 | ASN1_INTEGER timeout; | 101 | ASN1_INTEGER timeout; |
| 105 | ASN1_INTEGER verify_result; | 102 | ASN1_INTEGER verify_result; |
| @@ -112,9 +109,6 @@ typedef struct ssl_session_asn1_st { | |||
| 112 | ASN1_OCTET_STRING psk_identity_hint; | 109 | ASN1_OCTET_STRING psk_identity_hint; |
| 113 | ASN1_OCTET_STRING psk_identity; | 110 | ASN1_OCTET_STRING psk_identity; |
| 114 | #endif /* OPENSSL_NO_PSK */ | 111 | #endif /* OPENSSL_NO_PSK */ |
| 115 | #ifndef OPENSSL_NO_SRP | ||
| 116 | ASN1_OCTET_STRING srp_username; | ||
| 117 | #endif /* OPENSSL_NO_SRP */ | ||
| 118 | } SSL_SESSION_ASN1; | 112 | } SSL_SESSION_ASN1; |
| 119 | 113 | ||
| 120 | int | 114 | int |
| @@ -132,9 +126,6 @@ i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | |||
| 132 | unsigned char cbuf; | 126 | unsigned char cbuf; |
| 133 | int v11 = 0; | 127 | int v11 = 0; |
| 134 | #endif | 128 | #endif |
| 135 | #ifndef OPENSSL_NO_SRP | ||
| 136 | int v12 = 0; | ||
| 137 | #endif | ||
| 138 | long l; | 129 | long l; |
| 139 | SSL_SESSION_ASN1 a; | 130 | SSL_SESSION_ASN1 a; |
| 140 | M_ASN1_I2D_vars(in); | 131 | M_ASN1_I2D_vars(in); |
| @@ -189,13 +180,6 @@ i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | |||
| 189 | a.session_id_context.type = V_ASN1_OCTET_STRING; | 180 | a.session_id_context.type = V_ASN1_OCTET_STRING; |
| 190 | a.session_id_context.data = in->sid_ctx; | 181 | a.session_id_context.data = in->sid_ctx; |
| 191 | 182 | ||
| 192 | #ifndef OPENSSL_NO_KRB5 | ||
| 193 | if (in->krb5_client_princ_len) { | ||
| 194 | a.krb5_princ.length = in->krb5_client_princ_len; | ||
| 195 | a.krb5_princ.type = V_ASN1_OCTET_STRING; | ||
| 196 | a.krb5_princ.data = in->krb5_client_princ; | ||
| 197 | } | ||
| 198 | #endif /* OPENSSL_NO_KRB5 */ | ||
| 199 | 183 | ||
| 200 | if (in->time != 0L) { | 184 | if (in->time != 0L) { |
| 201 | a.time.length = LSIZE2; | 185 | a.time.length = LSIZE2; |
| @@ -248,23 +232,12 @@ i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | |||
| 248 | a.psk_identity.data = (unsigned char *)(in->psk_identity); | 232 | a.psk_identity.data = (unsigned char *)(in->psk_identity); |
| 249 | } | 233 | } |
| 250 | #endif /* OPENSSL_NO_PSK */ | 234 | #endif /* OPENSSL_NO_PSK */ |
| 251 | #ifndef OPENSSL_NO_SRP | ||
| 252 | if (in->srp_username) { | ||
| 253 | a.srp_username.length = strlen(in->srp_username); | ||
| 254 | a.srp_username.type = V_ASN1_OCTET_STRING; | ||
| 255 | a.srp_username.data = (unsigned char *)(in->srp_username); | ||
| 256 | } | ||
| 257 | #endif /* OPENSSL_NO_SRP */ | ||
| 258 | 235 | ||
| 259 | M_ASN1_I2D_len(&(a.version), i2d_ASN1_INTEGER); | 236 | M_ASN1_I2D_len(&(a.version), i2d_ASN1_INTEGER); |
| 260 | M_ASN1_I2D_len(&(a.ssl_version), i2d_ASN1_INTEGER); | 237 | M_ASN1_I2D_len(&(a.ssl_version), i2d_ASN1_INTEGER); |
| 261 | M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); | 238 | M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); |
| 262 | M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING); | 239 | M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING); |
| 263 | M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); | 240 | M_ASN1_I2D_len(&(a.master_key), i2d_ASN1_OCTET_STRING); |
| 264 | #ifndef OPENSSL_NO_KRB5 | ||
| 265 | if (in->krb5_client_princ_len) | ||
| 266 | M_ASN1_I2D_len(&(a.krb5_princ), i2d_ASN1_OCTET_STRING); | ||
| 267 | #endif /* OPENSSL_NO_KRB5 */ | ||
| 268 | if (in->time != 0L) | 241 | if (in->time != 0L) |
| 269 | M_ASN1_I2D_len_EXP_opt(&(a.time), i2d_ASN1_INTEGER, 1, v1); | 242 | M_ASN1_I2D_len_EXP_opt(&(a.time), i2d_ASN1_INTEGER, 1, v1); |
| 270 | if (in->timeout != 0L) | 243 | if (in->timeout != 0L) |
| @@ -293,10 +266,6 @@ i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | |||
| 293 | if (in->psk_identity) | 266 | if (in->psk_identity) |
| 294 | M_ASN1_I2D_len_EXP_opt(&(a.psk_identity), i2d_ASN1_OCTET_STRING, 8, v8); | 267 | M_ASN1_I2D_len_EXP_opt(&(a.psk_identity), i2d_ASN1_OCTET_STRING, 8, v8); |
| 295 | #endif /* OPENSSL_NO_PSK */ | 268 | #endif /* OPENSSL_NO_PSK */ |
| 296 | #ifndef OPENSSL_NO_SRP | ||
| 297 | if (in->srp_username) | ||
| 298 | M_ASN1_I2D_len_EXP_opt(&(a.srp_username), i2d_ASN1_OCTET_STRING, 12, v12); | ||
| 299 | #endif /* OPENSSL_NO_SRP */ | ||
| 300 | 269 | ||
| 301 | M_ASN1_I2D_seq_total(); | 270 | M_ASN1_I2D_seq_total(); |
| 302 | 271 | ||
| @@ -305,10 +274,6 @@ i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | |||
| 305 | M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRING); | 274 | M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRING); |
| 306 | M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING); | 275 | M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING); |
| 307 | M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); | 276 | M_ASN1_I2D_put(&(a.master_key), i2d_ASN1_OCTET_STRING); |
| 308 | #ifndef OPENSSL_NO_KRB5 | ||
| 309 | if (in->krb5_client_princ_len) | ||
| 310 | M_ASN1_I2D_put(&(a.krb5_princ), i2d_ASN1_OCTET_STRING); | ||
| 311 | #endif /* OPENSSL_NO_KRB5 */ | ||
| 312 | if (in->time != 0L) | 277 | if (in->time != 0L) |
| 313 | M_ASN1_I2D_put_EXP_opt(&(a.time), i2d_ASN1_INTEGER, 1, v1); | 278 | M_ASN1_I2D_put_EXP_opt(&(a.time), i2d_ASN1_INTEGER, 1, v1); |
| 314 | if (in->timeout != 0L) | 279 | if (in->timeout != 0L) |
| @@ -339,10 +304,6 @@ i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | |||
| 339 | if (in->compress_meth) | 304 | if (in->compress_meth) |
| 340 | M_ASN1_I2D_put_EXP_opt(&(a.comp_id), i2d_ASN1_OCTET_STRING, 11, v11); | 305 | M_ASN1_I2D_put_EXP_opt(&(a.comp_id), i2d_ASN1_OCTET_STRING, 11, v11); |
| 341 | #endif | 306 | #endif |
| 342 | #ifndef OPENSSL_NO_SRP | ||
| 343 | if (in->srp_username) | ||
| 344 | M_ASN1_I2D_put_EXP_opt(&(a.srp_username), i2d_ASN1_OCTET_STRING, 12, v12); | ||
| 345 | #endif /* OPENSSL_NO_SRP */ | ||
| 346 | M_ASN1_I2D_finish(); | 307 | M_ASN1_I2D_finish(); |
| 347 | } | 308 | } |
| 348 | 309 | ||
| @@ -420,21 +381,6 @@ d2i_SSL_SESSION(SSL_SESSION **a, const unsigned char **pp, long length) | |||
| 420 | 381 | ||
| 421 | os.length = 0; | 382 | os.length = 0; |
| 422 | 383 | ||
| 423 | #ifndef OPENSSL_NO_KRB5 | ||
| 424 | os.length = 0; | ||
| 425 | M_ASN1_D2I_get_opt(osp, d2i_ASN1_OCTET_STRING, V_ASN1_OCTET_STRING); | ||
| 426 | if (os.data) { | ||
| 427 | if (os.length > SSL_MAX_KRB5_PRINCIPAL_LENGTH) | ||
| 428 | ret->krb5_client_princ_len = 0; | ||
| 429 | else | ||
| 430 | ret->krb5_client_princ_len = os.length; | ||
| 431 | memcpy(ret->krb5_client_princ, os.data, ret->krb5_client_princ_len); | ||
| 432 | free(os.data); | ||
| 433 | os.data = NULL; | ||
| 434 | os.length = 0; | ||
| 435 | } else | ||
| 436 | ret->krb5_client_princ_len = 0; | ||
| 437 | #endif /* OPENSSL_NO_KRB5 */ | ||
| 438 | 384 | ||
| 439 | ai.length = 0; | 385 | ai.length = 0; |
| 440 | M_ASN1_D2I_get_EXP_opt(aip, d2i_ASN1_INTEGER, 1); /* XXX 2038 */ | 386 | M_ASN1_D2I_get_EXP_opt(aip, d2i_ASN1_INTEGER, 1); /* XXX 2038 */ |
| @@ -561,18 +507,6 @@ d2i_SSL_SESSION(SSL_SESSION **a, const unsigned char **pp, long length) | |||
| 561 | } | 507 | } |
| 562 | #endif | 508 | #endif |
| 563 | 509 | ||
| 564 | #ifndef OPENSSL_NO_SRP | ||
| 565 | os.length = 0; | ||
| 566 | os.data = NULL; | ||
| 567 | M_ASN1_D2I_get_EXP_opt(osp, d2i_ASN1_OCTET_STRING, 12); | ||
| 568 | if (os.data) { | ||
| 569 | ret->srp_username = BUF_strndup((char *)os.data, os.length); | ||
| 570 | free(os.data); | ||
| 571 | os.data = NULL; | ||
| 572 | os.length = 0; | ||
| 573 | } else | ||
| 574 | ret->srp_username = NULL; | ||
| 575 | #endif /* OPENSSL_NO_SRP */ | ||
| 576 | 510 | ||
| 577 | M_ASN1_D2I_Finish(a, SSL_SESSION_free, SSL_F_D2I_SSL_SESSION); | 511 | M_ASN1_D2I_Finish(a, SSL_SESSION_free, SSL_F_D2I_SSL_SESSION); |
| 578 | } | 512 | } |
