diff options
Diffstat (limited to 'src/lib/libssl/ssl_asn1.c')
| -rw-r--r-- | src/lib/libssl/ssl_asn1.c | 50 |
1 files changed, 0 insertions, 50 deletions
diff --git a/src/lib/libssl/ssl_asn1.c b/src/lib/libssl/ssl_asn1.c index 38540be1e5..d7f4c6087e 100644 --- a/src/lib/libssl/ssl_asn1.c +++ b/src/lib/libssl/ssl_asn1.c | |||
| @@ -114,9 +114,6 @@ typedef struct ssl_session_asn1_st | |||
| 114 | ASN1_OCTET_STRING psk_identity_hint; | 114 | ASN1_OCTET_STRING psk_identity_hint; |
| 115 | ASN1_OCTET_STRING psk_identity; | 115 | ASN1_OCTET_STRING psk_identity; |
| 116 | #endif /* OPENSSL_NO_PSK */ | 116 | #endif /* OPENSSL_NO_PSK */ |
| 117 | #ifndef OPENSSL_NO_SRP | ||
| 118 | ASN1_OCTET_STRING srp_username; | ||
| 119 | #endif /* OPENSSL_NO_SRP */ | ||
| 120 | } SSL_SESSION_ASN1; | 117 | } SSL_SESSION_ASN1; |
| 121 | 118 | ||
| 122 | int i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | 119 | int i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) |
| @@ -133,9 +130,6 @@ int i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | |||
| 133 | unsigned char cbuf; | 130 | unsigned char cbuf; |
| 134 | int v11=0; | 131 | int v11=0; |
| 135 | #endif | 132 | #endif |
| 136 | #ifndef OPENSSL_NO_SRP | ||
| 137 | int v12=0; | ||
| 138 | #endif | ||
| 139 | long l; | 133 | long l; |
| 140 | SSL_SESSION_ASN1 a; | 134 | SSL_SESSION_ASN1 a; |
| 141 | M_ASN1_I2D_vars(in); | 135 | M_ASN1_I2D_vars(in); |
| @@ -273,14 +267,6 @@ int i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | |||
| 273 | a.psk_identity.data=(unsigned char *)(in->psk_identity); | 267 | a.psk_identity.data=(unsigned char *)(in->psk_identity); |
| 274 | } | 268 | } |
| 275 | #endif /* OPENSSL_NO_PSK */ | 269 | #endif /* OPENSSL_NO_PSK */ |
| 276 | #ifndef OPENSSL_NO_SRP | ||
| 277 | if (in->srp_username) | ||
| 278 | { | ||
| 279 | a.srp_username.length=strlen(in->srp_username); | ||
| 280 | a.srp_username.type=V_ASN1_OCTET_STRING; | ||
| 281 | a.srp_username.data=(unsigned char *)(in->srp_username); | ||
| 282 | } | ||
| 283 | #endif /* OPENSSL_NO_SRP */ | ||
| 284 | 270 | ||
| 285 | M_ASN1_I2D_len(&(a.version), i2d_ASN1_INTEGER); | 271 | M_ASN1_I2D_len(&(a.version), i2d_ASN1_INTEGER); |
| 286 | M_ASN1_I2D_len(&(a.ssl_version), i2d_ASN1_INTEGER); | 272 | M_ASN1_I2D_len(&(a.ssl_version), i2d_ASN1_INTEGER); |
| @@ -321,10 +307,6 @@ int i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | |||
| 321 | if (in->psk_identity) | 307 | if (in->psk_identity) |
| 322 | M_ASN1_I2D_len_EXP_opt(&(a.psk_identity), i2d_ASN1_OCTET_STRING,8,v8); | 308 | M_ASN1_I2D_len_EXP_opt(&(a.psk_identity), i2d_ASN1_OCTET_STRING,8,v8); |
| 323 | #endif /* OPENSSL_NO_PSK */ | 309 | #endif /* OPENSSL_NO_PSK */ |
| 324 | #ifndef OPENSSL_NO_SRP | ||
| 325 | if (in->srp_username) | ||
| 326 | M_ASN1_I2D_len_EXP_opt(&(a.srp_username), i2d_ASN1_OCTET_STRING,12,v12); | ||
| 327 | #endif /* OPENSSL_NO_SRP */ | ||
| 328 | 310 | ||
| 329 | M_ASN1_I2D_seq_total(); | 311 | M_ASN1_I2D_seq_total(); |
| 330 | 312 | ||
| @@ -369,10 +351,6 @@ int i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp) | |||
| 369 | if (in->compress_meth) | 351 | if (in->compress_meth) |
| 370 | M_ASN1_I2D_put_EXP_opt(&(a.comp_id), i2d_ASN1_OCTET_STRING,11,v11); | 352 | M_ASN1_I2D_put_EXP_opt(&(a.comp_id), i2d_ASN1_OCTET_STRING,11,v11); |
| 371 | #endif | 353 | #endif |
| 372 | #ifndef OPENSSL_NO_SRP | ||
| 373 | if (in->srp_username) | ||
| 374 | M_ASN1_I2D_put_EXP_opt(&(a.srp_username), i2d_ASN1_OCTET_STRING,12,v12); | ||
| 375 | #endif /* OPENSSL_NO_SRP */ | ||
| 376 | M_ASN1_I2D_finish(); | 354 | M_ASN1_I2D_finish(); |
| 377 | } | 355 | } |
| 378 | 356 | ||
| @@ -571,19 +549,6 @@ SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, const unsigned char **pp, | |||
| 571 | } | 549 | } |
| 572 | else | 550 | else |
| 573 | ret->psk_identity_hint=NULL; | 551 | ret->psk_identity_hint=NULL; |
| 574 | |||
| 575 | os.length=0; | ||
| 576 | os.data=NULL; | ||
| 577 | M_ASN1_D2I_get_EXP_opt(osp,d2i_ASN1_OCTET_STRING,8); | ||
| 578 | if (os.data) | ||
| 579 | { | ||
| 580 | ret->psk_identity = BUF_strndup((char *)os.data, os.length); | ||
| 581 | OPENSSL_free(os.data); | ||
| 582 | os.data = NULL; | ||
| 583 | os.length = 0; | ||
| 584 | } | ||
| 585 | else | ||
| 586 | ret->psk_identity=NULL; | ||
| 587 | #endif /* OPENSSL_NO_PSK */ | 552 | #endif /* OPENSSL_NO_PSK */ |
| 588 | 553 | ||
| 589 | #ifndef OPENSSL_NO_TLSEXT | 554 | #ifndef OPENSSL_NO_TLSEXT |
| @@ -623,20 +588,5 @@ SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, const unsigned char **pp, | |||
| 623 | } | 588 | } |
| 624 | #endif | 589 | #endif |
| 625 | 590 | ||
| 626 | #ifndef OPENSSL_NO_SRP | ||
| 627 | os.length=0; | ||
| 628 | os.data=NULL; | ||
| 629 | M_ASN1_D2I_get_EXP_opt(osp,d2i_ASN1_OCTET_STRING,12); | ||
| 630 | if (os.data) | ||
| 631 | { | ||
| 632 | ret->srp_username = BUF_strndup((char *)os.data, os.length); | ||
| 633 | OPENSSL_free(os.data); | ||
| 634 | os.data = NULL; | ||
| 635 | os.length = 0; | ||
| 636 | } | ||
| 637 | else | ||
| 638 | ret->srp_username=NULL; | ||
| 639 | #endif /* OPENSSL_NO_SRP */ | ||
| 640 | |||
| 641 | M_ASN1_D2I_Finish(a,SSL_SESSION_free,SSL_F_D2I_SSL_SESSION); | 591 | M_ASN1_D2I_Finish(a,SSL_SESSION_free,SSL_F_D2I_SSL_SESSION); |
| 642 | } | 592 | } |
