diff options
Diffstat (limited to 'src/lib/libssl/ssl_ciph.c')
| -rw-r--r-- | src/lib/libssl/ssl_ciph.c | 62 |
1 files changed, 3 insertions, 59 deletions
diff --git a/src/lib/libssl/ssl_ciph.c b/src/lib/libssl/ssl_ciph.c index 9df4f8a0c9..a2dec527ca 100644 --- a/src/lib/libssl/ssl_ciph.c +++ b/src/lib/libssl/ssl_ciph.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_ciph.c,v 1.64 2014/07/12 07:52:36 guenther Exp $ */ | 1 | /* $OpenBSD: ssl_ciph.c,v 1.65 2014/07/12 13:11:53 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -273,11 +273,6 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
| 273 | }, | 273 | }, |
| 274 | 274 | ||
| 275 | { | 275 | { |
| 276 | .name = SSL_TXT_kKRB5, | ||
| 277 | .algorithm_mkey = SSL_kKRB5, | ||
| 278 | }, | ||
| 279 | |||
| 280 | { | ||
| 281 | .name = SSL_TXT_kECDHr, | 276 | .name = SSL_TXT_kECDHr, |
| 282 | .algorithm_mkey = SSL_kECDHr, | 277 | .algorithm_mkey = SSL_kECDHr, |
| 283 | }, | 278 | }, |
| @@ -299,14 +294,6 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
| 299 | }, | 294 | }, |
| 300 | 295 | ||
| 301 | { | 296 | { |
| 302 | .name = SSL_TXT_kPSK, | ||
| 303 | .algorithm_mkey = SSL_kPSK, | ||
| 304 | }, | ||
| 305 | { | ||
| 306 | .name = SSL_TXT_kSRP, | ||
| 307 | .algorithm_mkey = SSL_kSRP, | ||
| 308 | }, | ||
| 309 | { | ||
| 310 | .name = SSL_TXT_kGOST, | 297 | .name = SSL_TXT_kGOST, |
| 311 | .algorithm_mkey = SSL_kGOST, | 298 | .algorithm_mkey = SSL_kGOST, |
| 312 | }, | 299 | }, |
| @@ -325,10 +312,6 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
| 325 | .algorithm_auth = SSL_aDSS, | 312 | .algorithm_auth = SSL_aDSS, |
| 326 | }, | 313 | }, |
| 327 | { | 314 | { |
| 328 | .name = SSL_TXT_aKRB5, | ||
| 329 | .algorithm_auth = SSL_aKRB5, | ||
| 330 | }, | ||
| 331 | { | ||
| 332 | .name = SSL_TXT_aNULL, | 315 | .name = SSL_TXT_aNULL, |
| 333 | .algorithm_auth = SSL_aNULL, | 316 | .algorithm_auth = SSL_aNULL, |
| 334 | }, | 317 | }, |
| @@ -350,10 +333,6 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
| 350 | .algorithm_auth = SSL_aECDSA, | 333 | .algorithm_auth = SSL_aECDSA, |
| 351 | }, | 334 | }, |
| 352 | { | 335 | { |
| 353 | .name = SSL_TXT_aPSK, | ||
| 354 | .algorithm_auth = SSL_aPSK, | ||
| 355 | }, | ||
| 356 | { | ||
| 357 | .name = SSL_TXT_aGOST94, | 336 | .name = SSL_TXT_aGOST94, |
| 358 | .algorithm_auth = SSL_aGOST94, | 337 | .algorithm_auth = SSL_aGOST94, |
| 359 | }, | 338 | }, |
| @@ -382,11 +361,6 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
| 382 | .algorithm_enc = SSL_eNULL, | 361 | .algorithm_enc = SSL_eNULL, |
| 383 | }, | 362 | }, |
| 384 | { | 363 | { |
| 385 | .name = SSL_TXT_KRB5, | ||
| 386 | .algorithm_mkey = SSL_kKRB5, | ||
| 387 | .algorithm_auth = SSL_aKRB5, | ||
| 388 | }, | ||
| 389 | { | ||
| 390 | .name = SSL_TXT_RSA, | 364 | .name = SSL_TXT_RSA, |
| 391 | .algorithm_mkey = SSL_kRSA, | 365 | .algorithm_mkey = SSL_kRSA, |
| 392 | .algorithm_auth = SSL_aRSA, | 366 | .algorithm_auth = SSL_aRSA, |
| @@ -401,16 +375,7 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
| 401 | .algorithm_mkey = SSL_kEECDH, | 375 | .algorithm_mkey = SSL_kEECDH, |
| 402 | .algorithm_auth = SSL_aNULL, | 376 | .algorithm_auth = SSL_aNULL, |
| 403 | }, | 377 | }, |
| 404 | { | 378 | |
| 405 | .name = SSL_TXT_PSK, | ||
| 406 | .algorithm_mkey = SSL_kPSK, | ||
| 407 | .algorithm_auth = SSL_aPSK, | ||
| 408 | }, | ||
| 409 | { | ||
| 410 | .name = SSL_TXT_SRP, | ||
| 411 | .algorithm_mkey = SSL_kSRP, | ||
| 412 | }, | ||
| 413 | |||
| 414 | /* symmetric encryption aliases */ | 379 | /* symmetric encryption aliases */ |
| 415 | { | 380 | { |
| 416 | .name = SSL_TXT_DES, | 381 | .name = SSL_TXT_DES, |
| @@ -881,11 +846,7 @@ ssl_cipher_get_disabled(unsigned long *mkey, unsigned long *auth, unsigned long | |||
| 881 | 846 | ||
| 882 | *mkey |= SSL_kDHr|SSL_kDHd; /* no such ciphersuites supported! */ | 847 | *mkey |= SSL_kDHr|SSL_kDHd; /* no such ciphersuites supported! */ |
| 883 | *auth |= SSL_aDH; | 848 | *auth |= SSL_aDH; |
| 884 | *mkey |= SSL_kKRB5; | 849 | |
| 885 | *auth |= SSL_aKRB5; | ||
| 886 | *mkey |= SSL_kPSK; | ||
| 887 | *auth |= SSL_aPSK; | ||
| 888 | *mkey |= SSL_kSRP; | ||
| 889 | /* Check for presence of GOST 34.10 algorithms, and if they | 850 | /* Check for presence of GOST 34.10 algorithms, and if they |
| 890 | * do not present, disable appropriate auth and key exchange */ | 851 | * do not present, disable appropriate auth and key exchange */ |
| 891 | if (!get_optional_pkey_id("gost94")) { | 852 | if (!get_optional_pkey_id("gost94")) { |
| @@ -1515,8 +1476,6 @@ ssl_create_cipher_list(const SSL_METHOD *ssl_method, | |||
| 1515 | ssl_cipher_apply_rule(0, 0, SSL_aECDH, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); | 1476 | ssl_cipher_apply_rule(0, 0, SSL_aECDH, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); |
| 1516 | /* ssl_cipher_apply_rule(0, 0, SSL_aDH, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); */ | 1477 | /* ssl_cipher_apply_rule(0, 0, SSL_aDH, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); */ |
| 1517 | ssl_cipher_apply_rule(0, SSL_kRSA, 0, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); | 1478 | ssl_cipher_apply_rule(0, SSL_kRSA, 0, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); |
| 1518 | ssl_cipher_apply_rule(0, SSL_kPSK, 0, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); | ||
| 1519 | ssl_cipher_apply_rule(0, SSL_kKRB5, 0, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); | ||
| 1520 | 1479 | ||
| 1521 | /* RC4 is sort-of broken -- move the the end */ | 1480 | /* RC4 is sort-of broken -- move the the end */ |
| 1522 | ssl_cipher_apply_rule(0, 0, 0, SSL_RC4, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); | 1481 | ssl_cipher_apply_rule(0, 0, 0, SSL_RC4, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); |
| @@ -1650,9 +1609,6 @@ SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) | |||
| 1650 | case SSL_kDHd: | 1609 | case SSL_kDHd: |
| 1651 | kx = "DH/DSS"; | 1610 | kx = "DH/DSS"; |
| 1652 | break; | 1611 | break; |
| 1653 | case SSL_kKRB5: | ||
| 1654 | kx = "KRB5"; | ||
| 1655 | break; | ||
| 1656 | case SSL_kEDH: | 1612 | case SSL_kEDH: |
| 1657 | kx = "DH"; | 1613 | kx = "DH"; |
| 1658 | break; | 1614 | break; |
| @@ -1665,12 +1621,6 @@ SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) | |||
| 1665 | case SSL_kEECDH: | 1621 | case SSL_kEECDH: |
| 1666 | kx = "ECDH"; | 1622 | kx = "ECDH"; |
| 1667 | break; | 1623 | break; |
| 1668 | case SSL_kPSK: | ||
| 1669 | kx = "PSK"; | ||
| 1670 | break; | ||
| 1671 | case SSL_kSRP: | ||
| 1672 | kx = "SRP"; | ||
| 1673 | break; | ||
| 1674 | default: | 1624 | default: |
| 1675 | kx = "unknown"; | 1625 | kx = "unknown"; |
| 1676 | } | 1626 | } |
| @@ -1685,9 +1635,6 @@ SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) | |||
| 1685 | case SSL_aDH: | 1635 | case SSL_aDH: |
| 1686 | au = "DH"; | 1636 | au = "DH"; |
| 1687 | break; | 1637 | break; |
| 1688 | case SSL_aKRB5: | ||
| 1689 | au = "KRB5"; | ||
| 1690 | break; | ||
| 1691 | case SSL_aECDH: | 1638 | case SSL_aECDH: |
| 1692 | au = "ECDH"; | 1639 | au = "ECDH"; |
| 1693 | break; | 1640 | break; |
| @@ -1697,9 +1644,6 @@ SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) | |||
| 1697 | case SSL_aECDSA: | 1644 | case SSL_aECDSA: |
| 1698 | au = "ECDSA"; | 1645 | au = "ECDSA"; |
| 1699 | break; | 1646 | break; |
| 1700 | case SSL_aPSK: | ||
| 1701 | au = "PSK"; | ||
| 1702 | break; | ||
| 1703 | default: | 1647 | default: |
| 1704 | au = "unknown"; | 1648 | au = "unknown"; |
| 1705 | break; | 1649 | break; |
