diff options
author | Bob Beck <beck@cvs.openbsd.org> | 2014-07-11 09:24:45 +0000 |
---|---|---|
committer | Bob Beck <beck@cvs.openbsd.org> | 2014-07-11 09:24:45 +0000 |
commit | 2ee8d38e6c5976a657cc836e1f24a650ba6bbe87 (patch) | |
tree | 10878e8aa33dfb259fdde248c2b7fba65138ec88 /lib/libssl/s3_lib.c | |
parent | 51ace4d54c3ebf820c60c80f4b455df4f3b769c3 (diff) |
Remove the PSK code. We don't need to drag around this
baggage.
ok miod@ jsing@
Diffstat (limited to 'lib/libssl/s3_lib.c')
-rw-r--r-- | lib/libssl/s3_lib.c | 72 |
1 files changed, 1 insertions, 71 deletions
diff --git a/lib/libssl/s3_lib.c b/lib/libssl/s3_lib.c index 400c1b87e0d..f94e207fc4e 100644 --- a/lib/libssl/s3_lib.c +++ b/lib/libssl/s3_lib.c @@ -1,4 +1,4 @@ -/* $OpenBSD: s3_lib.c,v 1.68 2014/07/10 08:51:14 tedu Exp $ */ +/* $OpenBSD: s3_lib.c,v 1.69 2014/07/11 09:24:44 beck Exp $ */ /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * @@ -1262,71 +1262,6 @@ SSL_CIPHER ssl3_ciphers[] = { }, #endif /* OPENSSL_NO_CAMELLIA */ -#ifndef OPENSSL_NO_PSK - /* Cipher 8A */ - { - .valid = 1, - .name = TLS1_TXT_PSK_WITH_RC4_128_SHA, - .id = TLS1_CK_PSK_WITH_RC4_128_SHA, - .algorithm_mkey = SSL_kPSK, - .algorithm_auth = SSL_aPSK, - .algorithm_enc = SSL_RC4, - .algorithm_mac = SSL_SHA1, - .algorithm_ssl = SSL_TLSV1, - .algo_strength = SSL_MEDIUM, - .algorithm2 = SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF, - .strength_bits = 128, - .alg_bits = 128, - }, - - /* Cipher 8B */ - { - .valid = 1, - .name = TLS1_TXT_PSK_WITH_3DES_EDE_CBC_SHA, - .id = TLS1_CK_PSK_WITH_3DES_EDE_CBC_SHA, - .algorithm_mkey = SSL_kPSK, - .algorithm_auth = SSL_aPSK, - .algorithm_enc = SSL_3DES, - .algorithm_mac = SSL_SHA1, - .algorithm_ssl = SSL_TLSV1, - .algo_strength = SSL_HIGH, - .algorithm2 = SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF, - .strength_bits = 112, - .alg_bits = 168, - }, - - /* Cipher 8C */ - { - .valid = 1, - .name = TLS1_TXT_PSK_WITH_AES_128_CBC_SHA, - .id = TLS1_CK_PSK_WITH_AES_128_CBC_SHA, - .algorithm_mkey = SSL_kPSK, - .algorithm_auth = SSL_aPSK, - .algorithm_enc = SSL_AES128, - .algorithm_mac = SSL_SHA1, - .algorithm_ssl = SSL_TLSV1, - .algo_strength = SSL_HIGH, - .algorithm2 = SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF, - .strength_bits = 128, - .alg_bits = 128, - }, - - /* Cipher 8D */ - { - .valid = 1, - .name = TLS1_TXT_PSK_WITH_AES_256_CBC_SHA, - .id = TLS1_CK_PSK_WITH_AES_256_CBC_SHA, - .algorithm_mkey = SSL_kPSK, - .algorithm_auth = SSL_aPSK, - .algorithm_enc = SSL_AES256, - .algorithm_mac = SSL_SHA1, - .algorithm_ssl = SSL_TLSV1, - .algo_strength = SSL_HIGH, - .algorithm2 = SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF, - .strength_bits = 256, - .alg_bits = 256, - }, -#endif /* OPENSSL_NO_PSK */ /* GCM ciphersuites from RFC5288 */ @@ -3030,11 +2965,6 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt, alg_k = c->algorithm_mkey; alg_a = c->algorithm_auth; -#ifndef OPENSSL_NO_PSK - /* with PSK there must be server callback set */ - if ((alg_k & SSL_kPSK) && s->psk_server_callback == NULL) - continue; -#endif /* OPENSSL_NO_PSK */ ok = (alg_k & mask_k) && (alg_a & mask_a); |