diff options
author | 2020-09-11 17:36:27 +0000 | |
---|---|---|
committer | 2020-09-11 17:36:27 +0000 | |
commit | 8b316ce8bcd9067a30cb757818dad1051035dfb8 (patch) | |
tree | a534f03f85ae6446bfc8ee799c84a2bd765ba0a1 /lib/libssl/tls13_client.c | |
parent | Simplify SSL_get_ciphers(). (diff) | |
download | wireguard-openbsd-8b316ce8bcd9067a30cb757818dad1051035dfb8.tar.xz wireguard-openbsd-8b316ce8bcd9067a30cb757818dad1051035dfb8.zip |
Remove cipher_list_by_id.
When parsing a cipher string, a cipher list is created, before being
duplicated and sorted - the second copy being stored as cipher_list_by_id.
This is done only so that a client can ensure that the cipher selected by
a server is in the cipher list. This is pretty pointless given that most
clients are short-lived and that we already had to iterate over the cipher
list in order to build the client hello. Additionally, any update to the
cipher list requires that cipher_list_by_id also be updated and kept in
sync.
Remove all of this and replace it with a simple linear scan - the overhead
of duplicating and sorting the cipher list likely exceeds that of a simple
linear scan over the cipher list (64 maximum, more typically ~9 or so).
ok beck@ tb@
Diffstat (limited to 'lib/libssl/tls13_client.c')
-rw-r--r-- | lib/libssl/tls13_client.c | 5 |
1 files changed, 2 insertions, 3 deletions
diff --git a/lib/libssl/tls13_client.c b/lib/libssl/tls13_client.c index bd72db8be0c..35409d92bdc 100644 --- a/lib/libssl/tls13_client.c +++ b/lib/libssl/tls13_client.c @@ -1,4 +1,4 @@ -/* $OpenBSD: tls13_client.c,v 1.66 2020/07/03 04:12:51 tb Exp $ */ +/* $OpenBSD: tls13_client.c,v 1.67 2020/09/11 17:36:27 jsing Exp $ */ /* * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> * @@ -304,8 +304,7 @@ tls13_server_hello_process(struct tls13_ctx *ctx, CBS *cbs) * hello and that it matches the TLS version selected. */ cipher = ssl3_get_cipher_by_value(cipher_suite); - if (cipher == NULL || - sk_SSL_CIPHER_find(ssl_get_ciphers_by_id(s), cipher) < 0) { + if (cipher == NULL || !ssl_cipher_in_list(SSL_get_ciphers(s), cipher)) { ctx->alert = TLS13_ALERT_ILLEGAL_PARAMETER; goto err; } |