summaryrefslogtreecommitdiffstats
path: root/lib/libssl/src/ssl/ssl_stat.c
diff options
context:
space:
mode:
authortedu <tedu@openbsd.org>2014-04-15 21:47:56 +0000
committertedu <tedu@openbsd.org>2014-04-15 21:47:56 +0000
commitd5cfd8ef9515508b49d0becea543a35da559ad24 (patch)
treeb923da10e3df21bcc7bdd233d4e7a18d8f587042 /lib/libssl/src/ssl/ssl_stat.c
parentthe VMS code is legion (diff)
downloadwireguard-openbsd-d5cfd8ef9515508b49d0becea543a35da559ad24.tar.xz
wireguard-openbsd-d5cfd8ef9515508b49d0becea543a35da559ad24.zip
remove ssl2 support even more completely.
in the process, always include ssl3 and tls1, we don't need config options for them. when the time comes to expire ssl3, it will be with an ax. checked by miod
Diffstat (limited to 'lib/libssl/src/ssl/ssl_stat.c')
-rw-r--r--lib/libssl/src/ssl/ssl_stat.c197
1 files changed, 0 insertions, 197 deletions
diff --git a/lib/libssl/src/ssl/ssl_stat.c b/lib/libssl/src/ssl/ssl_stat.c
index 3d9371cdd7a..da55c92de2e 100644
--- a/lib/libssl/src/ssl/ssl_stat.c
+++ b/lib/libssl/src/ssl/ssl_stat.c
@@ -109,86 +109,6 @@ const char
str="before/accept initialization"; break;
case SSL_ST_OK|SSL_ST_ACCEPT:
str="ok/accept SSL initialization"; break;
-#ifndef OPENSSL_NO_SSL2
- case SSL2_ST_CLIENT_START_ENCRYPTION:
- str="SSLv2 client start encryption"; break;
- case SSL2_ST_SERVER_START_ENCRYPTION:
- str="SSLv2 server start encryption"; break;
- case SSL2_ST_SEND_CLIENT_HELLO_A:
- str="SSLv2 write client hello A"; break;
- case SSL2_ST_SEND_CLIENT_HELLO_B:
- str="SSLv2 write client hello B"; break;
- case SSL2_ST_GET_SERVER_HELLO_A:
- str="SSLv2 read server hello A"; break;
- case SSL2_ST_GET_SERVER_HELLO_B:
- str="SSLv2 read server hello B"; break;
- case SSL2_ST_SEND_CLIENT_MASTER_KEY_A:
- str="SSLv2 write client master key A"; break;
- case SSL2_ST_SEND_CLIENT_MASTER_KEY_B:
- str="SSLv2 write client master key B"; break;
- case SSL2_ST_SEND_CLIENT_FINISHED_A:
- str="SSLv2 write client finished A"; break;
- case SSL2_ST_SEND_CLIENT_FINISHED_B:
- str="SSLv2 write client finished B"; break;
- case SSL2_ST_SEND_CLIENT_CERTIFICATE_A:
- str="SSLv2 write client certificate A"; break;
- case SSL2_ST_SEND_CLIENT_CERTIFICATE_B:
- str="SSLv2 write client certificate B"; break;
- case SSL2_ST_SEND_CLIENT_CERTIFICATE_C:
- str="SSLv2 write client certificate C"; break;
- case SSL2_ST_SEND_CLIENT_CERTIFICATE_D:
- str="SSLv2 write client certificate D"; break;
- case SSL2_ST_GET_SERVER_VERIFY_A:
- str="SSLv2 read server verify A"; break;
- case SSL2_ST_GET_SERVER_VERIFY_B:
- str="SSLv2 read server verify B"; break;
- case SSL2_ST_GET_SERVER_FINISHED_A:
- str="SSLv2 read server finished A"; break;
- case SSL2_ST_GET_SERVER_FINISHED_B:
- str="SSLv2 read server finished B"; break;
- case SSL2_ST_GET_CLIENT_HELLO_A:
- str="SSLv2 read client hello A"; break;
- case SSL2_ST_GET_CLIENT_HELLO_B:
- str="SSLv2 read client hello B"; break;
- case SSL2_ST_GET_CLIENT_HELLO_C:
- str="SSLv2 read client hello C"; break;
- case SSL2_ST_SEND_SERVER_HELLO_A:
- str="SSLv2 write server hello A"; break;
- case SSL2_ST_SEND_SERVER_HELLO_B:
- str="SSLv2 write server hello B"; break;
- case SSL2_ST_GET_CLIENT_MASTER_KEY_A:
- str="SSLv2 read client master key A"; break;
- case SSL2_ST_GET_CLIENT_MASTER_KEY_B:
- str="SSLv2 read client master key B"; break;
- case SSL2_ST_SEND_SERVER_VERIFY_A:
- str="SSLv2 write server verify A"; break;
- case SSL2_ST_SEND_SERVER_VERIFY_B:
- str="SSLv2 write server verify B"; break;
- case SSL2_ST_SEND_SERVER_VERIFY_C:
- str="SSLv2 write server verify C"; break;
- case SSL2_ST_GET_CLIENT_FINISHED_A:
- str="SSLv2 read client finished A"; break;
- case SSL2_ST_GET_CLIENT_FINISHED_B:
- str="SSLv2 read client finished B"; break;
- case SSL2_ST_SEND_SERVER_FINISHED_A:
- str="SSLv2 write server finished A"; break;
- case SSL2_ST_SEND_SERVER_FINISHED_B:
- str="SSLv2 write server finished B"; break;
- case SSL2_ST_SEND_REQUEST_CERTIFICATE_A:
- str="SSLv2 write request certificate A"; break;
- case SSL2_ST_SEND_REQUEST_CERTIFICATE_B:
- str="SSLv2 write request certificate B"; break;
- case SSL2_ST_SEND_REQUEST_CERTIFICATE_C:
- str="SSLv2 write request certificate C"; break;
- case SSL2_ST_SEND_REQUEST_CERTIFICATE_D:
- str="SSLv2 write request certificate D"; break;
- case SSL2_ST_X509_GET_SERVER_CERTIFICATE:
- str="SSLv2 X509 read server certificate"; break;
- case SSL2_ST_X509_GET_CLIENT_CERTIFICATE:
- str="SSLv2 X509 read client certificate"; break;
-#endif
-
-#ifndef OPENSSL_NO_SSL3
/* SSLv3 additions */
case SSL3_ST_CW_CLNT_HELLO_A:
str="SSLv3 write client hello A"; break;
@@ -312,25 +232,6 @@ const char
str="SSLv3 read certificate verify A"; break;
case SSL3_ST_SR_CERT_VRFY_B:
str="SSLv3 read certificate verify B"; break;
-#endif
-
-#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
-/* SSLv2/v3 compatibility states */
-/* client */
- case SSL23_ST_CW_CLNT_HELLO_A:
- str="SSLv2/v3 write client hello A"; break;
- case SSL23_ST_CW_CLNT_HELLO_B:
- str="SSLv2/v3 write client hello B"; break;
- case SSL23_ST_CR_SRVR_HELLO_A:
- str="SSLv2/v3 read server hello A"; break;
- case SSL23_ST_CR_SRVR_HELLO_B:
- str="SSLv2/v3 read server hello B"; break;
-/* server */
- case SSL23_ST_SR_CLNT_HELLO_A:
- str="SSLv2/v3 read client hello A"; break;
- case SSL23_ST_SR_CLNT_HELLO_B:
- str="SSLv2/v3 read client hello B"; break;
-#endif
/* DTLS */
case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A:
@@ -380,86 +281,7 @@ const char
str="CINIT "; break;
case SSL_ST_OK:
str="SSLOK "; break;
-#ifndef OPENSSL_NO_SSL2
- case SSL2_ST_CLIENT_START_ENCRYPTION:
- str="2CSENC"; break;
- case SSL2_ST_SERVER_START_ENCRYPTION:
- str="2SSENC"; break;
- case SSL2_ST_SEND_CLIENT_HELLO_A:
- str="2SCH_A"; break;
- case SSL2_ST_SEND_CLIENT_HELLO_B:
- str="2SCH_B"; break;
- case SSL2_ST_GET_SERVER_HELLO_A:
- str="2GSH_A"; break;
- case SSL2_ST_GET_SERVER_HELLO_B:
- str="2GSH_B"; break;
- case SSL2_ST_SEND_CLIENT_MASTER_KEY_A:
- str="2SCMKA"; break;
- case SSL2_ST_SEND_CLIENT_MASTER_KEY_B:
- str="2SCMKB"; break;
- case SSL2_ST_SEND_CLIENT_FINISHED_A:
- str="2SCF_A"; break;
- case SSL2_ST_SEND_CLIENT_FINISHED_B:
- str="2SCF_B"; break;
- case SSL2_ST_SEND_CLIENT_CERTIFICATE_A:
- str="2SCC_A"; break;
- case SSL2_ST_SEND_CLIENT_CERTIFICATE_B:
- str="2SCC_B"; break;
- case SSL2_ST_SEND_CLIENT_CERTIFICATE_C:
- str="2SCC_C"; break;
- case SSL2_ST_SEND_CLIENT_CERTIFICATE_D:
- str="2SCC_D"; break;
- case SSL2_ST_GET_SERVER_VERIFY_A:
- str="2GSV_A"; break;
- case SSL2_ST_GET_SERVER_VERIFY_B:
- str="2GSV_B"; break;
- case SSL2_ST_GET_SERVER_FINISHED_A:
- str="2GSF_A"; break;
- case SSL2_ST_GET_SERVER_FINISHED_B:
- str="2GSF_B"; break;
- case SSL2_ST_GET_CLIENT_HELLO_A:
- str="2GCH_A"; break;
- case SSL2_ST_GET_CLIENT_HELLO_B:
- str="2GCH_B"; break;
- case SSL2_ST_GET_CLIENT_HELLO_C:
- str="2GCH_C"; break;
- case SSL2_ST_SEND_SERVER_HELLO_A:
- str="2SSH_A"; break;
- case SSL2_ST_SEND_SERVER_HELLO_B:
- str="2SSH_B"; break;
- case SSL2_ST_GET_CLIENT_MASTER_KEY_A:
- str="2GCMKA"; break;
- case SSL2_ST_GET_CLIENT_MASTER_KEY_B:
- str="2GCMKA"; break;
- case SSL2_ST_SEND_SERVER_VERIFY_A:
- str="2SSV_A"; break;
- case SSL2_ST_SEND_SERVER_VERIFY_B:
- str="2SSV_B"; break;
- case SSL2_ST_SEND_SERVER_VERIFY_C:
- str="2SSV_C"; break;
- case SSL2_ST_GET_CLIENT_FINISHED_A:
- str="2GCF_A"; break;
- case SSL2_ST_GET_CLIENT_FINISHED_B:
- str="2GCF_B"; break;
- case SSL2_ST_SEND_SERVER_FINISHED_A:
- str="2SSF_A"; break;
- case SSL2_ST_SEND_SERVER_FINISHED_B:
- str="2SSF_B"; break;
- case SSL2_ST_SEND_REQUEST_CERTIFICATE_A:
- str="2SRC_A"; break;
- case SSL2_ST_SEND_REQUEST_CERTIFICATE_B:
- str="2SRC_B"; break;
- case SSL2_ST_SEND_REQUEST_CERTIFICATE_C:
- str="2SRC_C"; break;
- case SSL2_ST_SEND_REQUEST_CERTIFICATE_D:
- str="2SRC_D"; break;
- case SSL2_ST_X509_GET_SERVER_CERTIFICATE:
- str="2X9GSC"; break;
- case SSL2_ST_X509_GET_CLIENT_CERTIFICATE:
- str="2X9GCC"; break;
-#endif
-#ifndef OPENSSL_NO_SSL3
/* SSLv3 additions */
case SSL3_ST_SW_FLUSH:
case SSL3_ST_CW_FLUSH:
@@ -574,25 +396,6 @@ const char
str="3RCV_A"; break;
case SSL3_ST_SR_CERT_VRFY_B:
str="3RCV_B"; break;
-#endif
-
-#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
-/* SSLv2/v3 compatibility states */
-/* client */
- case SSL23_ST_CW_CLNT_HELLO_A:
- str="23WCHA"; break;
- case SSL23_ST_CW_CLNT_HELLO_B:
- str="23WCHB"; break;
- case SSL23_ST_CR_SRVR_HELLO_A:
- str="23RSHA"; break;
- case SSL23_ST_CR_SRVR_HELLO_B:
- str="23RSHA"; break;
-/* server */
- case SSL23_ST_SR_CLNT_HELLO_A:
- str="23RCHA"; break;
- case SSL23_ST_SR_CLNT_HELLO_B:
- str="23RCHB"; break;
-#endif
/* DTLS */
case DTLS1_ST_CR_HELLO_VERIFY_REQUEST_A:
str="DRCHVA"; break;