diff options
Diffstat (limited to 'src/lib')
-rw-r--r-- | src/lib/libssl/src/apps/s_client.c | 9 | ||||
-rw-r--r-- | src/lib/libssl/src/apps/s_server.c | 32 |
2 files changed, 0 insertions, 41 deletions
diff --git a/src/lib/libssl/src/apps/s_client.c b/src/lib/libssl/src/apps/s_client.c index e409589eb4..3dc613ebc2 100644 --- a/src/lib/libssl/src/apps/s_client.c +++ b/src/lib/libssl/src/apps/s_client.c | |||
@@ -418,9 +418,6 @@ s_client_main(int argc, char **argv) | |||
418 | { | 418 | { |
419 | unsigned int off = 0, clr = 0; | 419 | unsigned int off = 0, clr = 0; |
420 | SSL *con = NULL; | 420 | SSL *con = NULL; |
421 | #ifndef OPENSSL_NO_KRB5 | ||
422 | KSSL_CTX *kctx; | ||
423 | #endif | ||
424 | int s, k, width, state = 0, af = AF_UNSPEC; | 421 | int s, k, width, state = 0, af = AF_UNSPEC; |
425 | char *cbuf = NULL, *sbuf = NULL, *mbuf = NULL; | 422 | char *cbuf = NULL, *sbuf = NULL, *mbuf = NULL; |
426 | int cbuf_len, cbuf_off; | 423 | int cbuf_len, cbuf_off; |
@@ -963,12 +960,6 @@ bad: | |||
963 | } | 960 | } |
964 | } | 961 | } |
965 | #endif | 962 | #endif |
966 | #ifndef OPENSSL_NO_KRB5 | ||
967 | if (con && (kctx = kssl_ctx_new()) != NULL) { | ||
968 | SSL_set0_kssl_ctx(con, kctx); | ||
969 | kssl_ctx_setstring(kctx, KSSL_SERVER, host); | ||
970 | } | ||
971 | #endif /* OPENSSL_NO_KRB5 */ | ||
972 | /* SSL_set_cipher_list(con,"RC4-MD5"); */ | 963 | /* SSL_set_cipher_list(con,"RC4-MD5"); */ |
973 | #if 0 | 964 | #if 0 |
974 | #ifdef TLSEXT_TYPE_opaque_prf_input | 965 | #ifdef TLSEXT_TYPE_opaque_prf_input |
diff --git a/src/lib/libssl/src/apps/s_server.c b/src/lib/libssl/src/apps/s_server.c index 22e3c18ada..c34816749a 100644 --- a/src/lib/libssl/src/apps/s_server.c +++ b/src/lib/libssl/src/apps/s_server.c | |||
@@ -1557,9 +1557,6 @@ sv_body(char *hostname, int s, unsigned char *context) | |||
1557 | unsigned long l; | 1557 | unsigned long l; |
1558 | SSL *con = NULL; | 1558 | SSL *con = NULL; |
1559 | BIO *sbio; | 1559 | BIO *sbio; |
1560 | #ifndef OPENSSL_NO_KRB5 | ||
1561 | KSSL_CTX *kctx; | ||
1562 | #endif | ||
1563 | struct timeval timeout; | 1560 | struct timeval timeout; |
1564 | struct timeval *timeoutp; | 1561 | struct timeval *timeoutp; |
1565 | 1562 | ||
@@ -1589,13 +1586,6 @@ sv_body(char *hostname, int s, unsigned char *context) | |||
1589 | SSL_CTX_set_tlsext_status_arg(ctx, &tlscstatp); | 1586 | SSL_CTX_set_tlsext_status_arg(ctx, &tlscstatp); |
1590 | } | 1587 | } |
1591 | #endif | 1588 | #endif |
1592 | #ifndef OPENSSL_NO_KRB5 | ||
1593 | if ((kctx = kssl_ctx_new()) != NULL) { | ||
1594 | SSL_set0_kssl_ctx(con, kctx); | ||
1595 | kssl_ctx_setstring(kctx, KSSL_SERVICE, KRB5SVC); | ||
1596 | kssl_ctx_setstring(kctx, KSSL_KEYTAB, KRB5KEYTAB); | ||
1597 | } | ||
1598 | #endif /* OPENSSL_NO_KRB5 */ | ||
1599 | if (context) | 1589 | if (context) |
1600 | SSL_set_session_id_context(con, context, | 1590 | SSL_set_session_id_context(con, context, |
1601 | strlen((char *) context)); | 1591 | strlen((char *) context)); |
@@ -1885,9 +1875,6 @@ init_ssl_connection(SSL * con) | |||
1885 | X509 *peer; | 1875 | X509 *peer; |
1886 | long verify_error; | 1876 | long verify_error; |
1887 | char buf[BUFSIZ]; | 1877 | char buf[BUFSIZ]; |
1888 | #ifndef OPENSSL_NO_KRB5 | ||
1889 | char *client_princ; | ||
1890 | #endif | ||
1891 | #if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG) | 1878 | #if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG) |
1892 | const unsigned char *next_proto_neg; | 1879 | const unsigned char *next_proto_neg; |
1893 | unsigned next_proto_neg_len; | 1880 | unsigned next_proto_neg_len; |
@@ -1951,13 +1938,6 @@ init_ssl_connection(SSL * con) | |||
1951 | TLS1_FLAGS_TLS_PADDING_BUG) | 1938 | TLS1_FLAGS_TLS_PADDING_BUG) |
1952 | BIO_printf(bio_s_out, | 1939 | BIO_printf(bio_s_out, |
1953 | "Peer has incorrect TLSv1 block padding\n"); | 1940 | "Peer has incorrect TLSv1 block padding\n"); |
1954 | #ifndef OPENSSL_NO_KRB5 | ||
1955 | client_princ = kssl_ctx_get0_client_princ(SSL_get0_kssl_ctx(con)); | ||
1956 | if (client_princ != NULL) { | ||
1957 | BIO_printf(bio_s_out, "Kerberos peer principal is %s\n", | ||
1958 | client_princ); | ||
1959 | } | ||
1960 | #endif /* OPENSSL_NO_KRB5 */ | ||
1961 | BIO_printf(bio_s_out, "Secure Renegotiation IS%s supported\n", | 1941 | BIO_printf(bio_s_out, "Secure Renegotiation IS%s supported\n", |
1962 | SSL_get_secure_renegotiation_support(con) ? "" : " NOT"); | 1942 | SSL_get_secure_renegotiation_support(con) ? "" : " NOT"); |
1963 | if (keymatexportlabel != NULL) { | 1943 | if (keymatexportlabel != NULL) { |
@@ -2002,9 +1982,6 @@ err: | |||
2002 | return (ret); | 1982 | return (ret); |
2003 | } | 1983 | } |
2004 | #endif | 1984 | #endif |
2005 | #ifndef OPENSSL_NO_KRB5 | ||
2006 | char *client_princ; | ||
2007 | #endif | ||
2008 | 1985 | ||
2009 | #if 0 | 1986 | #if 0 |
2010 | static int | 1987 | static int |
@@ -2037,9 +2014,6 @@ www_body(char *hostname, int s, unsigned char *context) | |||
2037 | SSL *con; | 2014 | SSL *con; |
2038 | const SSL_CIPHER *c; | 2015 | const SSL_CIPHER *c; |
2039 | BIO *io, *ssl_bio, *sbio; | 2016 | BIO *io, *ssl_bio, *sbio; |
2040 | #ifndef OPENSSL_NO_KRB5 | ||
2041 | KSSL_CTX *kctx; | ||
2042 | #endif | ||
2043 | 2017 | ||
2044 | buf = malloc(bufsize); | 2018 | buf = malloc(bufsize); |
2045 | if (buf == NULL) | 2019 | if (buf == NULL) |
@@ -2070,12 +2044,6 @@ www_body(char *hostname, int s, unsigned char *context) | |||
2070 | SSL_set_tlsext_debug_arg(con, bio_s_out); | 2044 | SSL_set_tlsext_debug_arg(con, bio_s_out); |
2071 | } | 2045 | } |
2072 | #endif | 2046 | #endif |
2073 | #ifndef OPENSSL_NO_KRB5 | ||
2074 | if ((kctx = kssl_ctx_new()) != NULL) { | ||
2075 | kssl_ctx_setstring(kctx, KSSL_SERVICE, KRB5SVC); | ||
2076 | kssl_ctx_setstring(kctx, KSSL_KEYTAB, KRB5KEYTAB); | ||
2077 | } | ||
2078 | #endif /* OPENSSL_NO_KRB5 */ | ||
2079 | if (context) | 2047 | if (context) |
2080 | SSL_set_session_id_context(con, context, | 2048 | SSL_set_session_id_context(con, context, |
2081 | strlen((char *) context)); | 2049 | strlen((char *) context)); |