summaryrefslogtreecommitdiff
path: root/lib/libssl/ssl_ciph.c
diff options
context:
space:
mode:
authorJoel Sing <jsing@cvs.openbsd.org>2014-09-07 12:16:24 +0000
committerJoel Sing <jsing@cvs.openbsd.org>2014-09-07 12:16:24 +0000
commitc829d9c6024659a6ef1a28959b0d3f984d11ed7f (patch)
tree75b0b9c83fce604fe8ae06383d8d4e20045299b5 /lib/libssl/ssl_ciph.c
parent89099ea75c2e3ce3bbf36a3abc9f7df93e0ce9be (diff)
Remove SSL_kDHr, SSL_kDHd and SSL_aDH. No supported ciphersuites use them,
nor do we plan on supporting them. ok guenther@
Diffstat (limited to 'lib/libssl/ssl_ciph.c')
-rw-r--r--lib/libssl/ssl_ciph.c48
1 files changed, 9 insertions, 39 deletions
diff --git a/lib/libssl/ssl_ciph.c b/lib/libssl/ssl_ciph.c
index 70c91bf6007..701d0f2277e 100644
--- a/lib/libssl/ssl_ciph.c
+++ b/lib/libssl/ssl_ciph.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ssl_ciph.c,v 1.66 2014/07/12 22:33:39 jsing Exp $ */
+/* $OpenBSD: ssl_ciph.c,v 1.67 2014/09/07 12:16:23 jsing Exp $ */
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
* All rights reserved.
*
@@ -249,27 +249,12 @@ static const SSL_CIPHER cipher_aliases[] = {
.algorithm_mkey = SSL_kRSA,
},
{
- /* no such ciphersuites supported! */
- .name = SSL_TXT_kDHr,
- .algorithm_mkey = SSL_kDHr,
- },
- {
- /* no such ciphersuites supported! */
- .name = SSL_TXT_kDHd,
- .algorithm_mkey = SSL_kDHd,
- },
- {
- /* no such ciphersuites supported! */
- .name = SSL_TXT_kDH,
- .algorithm_mkey = SSL_kDHr|SSL_kDHd,
- },
- {
.name = SSL_TXT_kEDH,
.algorithm_mkey = SSL_kDHE,
},
{
.name = SSL_TXT_DH,
- .algorithm_mkey = SSL_kDHr|SSL_kDHd|SSL_kDHE,
+ .algorithm_mkey = SSL_kDHE,
},
{
@@ -316,11 +301,6 @@ static const SSL_CIPHER cipher_aliases[] = {
.algorithm_auth = SSL_aNULL,
},
{
- /* no such ciphersuites supported! */
- .name = SSL_TXT_aDH,
- .algorithm_auth = SSL_aDH,
- },
- {
.name = SSL_TXT_aECDH,
.algorithm_auth = SSL_aECDH,
},
@@ -836,7 +816,8 @@ ll_append_head(CIPHER_ORDER **head, CIPHER_ORDER *curr,
}
static void
-ssl_cipher_get_disabled(unsigned long *mkey, unsigned long *auth, unsigned long *enc, unsigned long *mac, unsigned long *ssl)
+ssl_cipher_get_disabled(unsigned long *mkey, unsigned long *auth,
+ unsigned long *enc, unsigned long *mac, unsigned long *ssl)
{
*mkey = 0;
*auth = 0;
@@ -844,18 +825,17 @@ ssl_cipher_get_disabled(unsigned long *mkey, unsigned long *auth, unsigned long
*mac = 0;
*ssl = 0;
- *mkey |= SSL_kDHr|SSL_kDHd; /* no such ciphersuites supported! */
- *auth |= SSL_aDH;
-
- /* Check for presence of GOST 34.10 algorithms, and if they
- * do not present, disable appropriate auth and key exchange */
+ /*
+ * Check for presence of GOST 34.10 algorithms, and if they
+ * do not present, disable appropriate auth and key exchange.
+ */
if (!get_optional_pkey_id("gost94")) {
*auth |= SSL_aGOST94;
}
if (!get_optional_pkey_id("gost2001")) {
*auth |= SSL_aGOST01;
}
- /* Disable GOST key exchange if no GOST signature algs are available * */
+ /* Disable GOST key exchange if no GOST signature algs are available. */
if ((*auth & (SSL_aGOST94|SSL_aGOST01)) == (SSL_aGOST94|SSL_aGOST01)) {
*mkey |= SSL_kGOST;
}
@@ -1474,7 +1454,6 @@ ssl_create_cipher_list(const SSL_METHOD *ssl_method,
/* Move ciphers without forward secrecy to the end */
ssl_cipher_apply_rule(0, 0, SSL_aECDH, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail);
- /* ssl_cipher_apply_rule(0, 0, SSL_aDH, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail); */
ssl_cipher_apply_rule(0, SSL_kRSA, 0, 0, 0, 0, 0, CIPHER_ORD, -1, &head, &tail);
/* RC4 is sort-of broken -- move the the end */
@@ -1603,12 +1582,6 @@ SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len)
case SSL_kRSA:
kx = "RSA";
break;
- case SSL_kDHr:
- kx = "DH/RSA";
- break;
- case SSL_kDHd:
- kx = "DH/DSS";
- break;
case SSL_kDHE:
kx = "DH";
break;
@@ -1632,9 +1605,6 @@ SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len)
case SSL_aDSS:
au = "DSS";
break;
- case SSL_aDH:
- au = "DH";
- break;
case SSL_aECDH:
au = "ECDH";
break;