summaryrefslogtreecommitdiffstats
path: root/lib/libssl/ssl_ciph.c
diff options
context:
space:
mode:
authorjsing <jsing@openbsd.org>2014-12-10 15:36:46 +0000
committerjsing <jsing@openbsd.org>2014-12-10 15:36:46 +0000
commit829c9983835882d17ba9edba19f49ebc0fc4186e (patch)
tree7ad8709f781116a7a6fb21045e30a4ed14a61b95 /lib/libssl/ssl_ciph.c
parentretire shutdown hooks; ok deraadt, krw (diff)
downloadwireguard-openbsd-829c9983835882d17ba9edba19f49ebc0fc4186e.tar.xz
wireguard-openbsd-829c9983835882d17ba9edba19f49ebc0fc4186e.zip
Remove support for GOST R 34.10-94 signature authentication, along with
the two ciphersuites that use it. GOST94 public/private keys have been long obsoleted and libcrypto does not have support for them anyway. Discussed with Dmitry Eremin-Solenikov.
Diffstat (limited to 'lib/libssl/ssl_ciph.c')
-rw-r--r--lib/libssl/ssl_ciph.c17
1 files changed, 4 insertions, 13 deletions
diff --git a/lib/libssl/ssl_ciph.c b/lib/libssl/ssl_ciph.c
index 72f774e7a93..1d7b4145eb5 100644
--- a/lib/libssl/ssl_ciph.c
+++ b/lib/libssl/ssl_ciph.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ssl_ciph.c,v 1.77 2014/12/07 12:13:06 jsing Exp $ */
+/* $OpenBSD: ssl_ciph.c,v 1.78 2014/12/10 15:36:47 jsing Exp $ */
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
* All rights reserved.
*
@@ -314,16 +314,12 @@ static const SSL_CIPHER cipher_aliases[] = {
.algorithm_auth = SSL_aECDSA,
},
{
- .name = SSL_TXT_aGOST94,
- .algorithm_auth = SSL_aGOST94,
- },
- {
.name = SSL_TXT_aGOST01,
.algorithm_auth = SSL_aGOST01,
},
{
.name = SSL_TXT_aGOST,
- .algorithm_auth = SSL_aGOST94|SSL_aGOST01,
+ .algorithm_auth = SSL_aGOST01,
},
/* aliases combining key exchange and server authentication */
@@ -808,12 +804,10 @@ ssl_cipher_get_disabled(unsigned long *mkey, unsigned long *auth,
* algorithms. If they are not available disable the associated
* authentication and key exchange algorithms.
*/
- if (EVP_PKEY_meth_find(NID_id_GostR3410_94) == NULL)
- *auth |= SSL_aGOST94;
- if (EVP_PKEY_meth_find(NID_id_GostR3410_2001) == NULL)
+ if (EVP_PKEY_meth_find(NID_id_GostR3410_2001) == NULL) {
*auth |= SSL_aGOST01;
- if (((~*auth) & (SSL_aGOST94|SSL_aGOST01)) == 0)
*mkey |= SSL_kGOST;
+ }
#ifdef SSL_FORBID_ENULL
*enc |= SSL_eNULL;
@@ -1589,9 +1583,6 @@ SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len)
case SSL_aECDSA:
au = "ECDSA";
break;
- case SSL_aGOST94:
- au = "GOST94";
- break;
case SSL_aGOST01:
au = "GOST01";
break;