diff options
author | Darren Tucker <dtucker@dtucker.net> | 2022-07-25 21:43:00 +1000 |
---|---|---|
committer | Darren Tucker <dtucker@dtucker.net> | 2022-07-25 21:43:00 +1000 |
commit | b7c56b65c12f51fe0dbae798d19c8f58224a5d95 (patch) | |
tree | e90039b969c8b52c5bcfe02a0786dcd64b2325fa /cipher.c | |
parent | 5a4a9f7a968fbf92cc1eac519c65638e79ae9f1f (diff) | |
download | openssh-git-b7c56b65c12f51fe0dbae798d19c8f58224a5d95.tar.gz |
Remove workarounds for OpenSSL missing AES-GCM.
We have some compatibility hacks that were added to support OpenSSL
versions that do not support AES GCM mode. Since that time, however,
the minimum OpenSSL version that we support has moved to 1.0.1 which
*does* have GCM, so this is no longer needed. ok djm@
Diffstat (limited to 'cipher.c')
-rw-r--r-- | cipher.c | 2 |
1 files changed, 0 insertions, 2 deletions
@@ -94,12 +94,10 @@ static const struct sshcipher ciphers[] = { { "aes128-ctr", 16, 16, 0, 0, 0, EVP_aes_128_ctr }, { "aes192-ctr", 16, 24, 0, 0, 0, EVP_aes_192_ctr }, { "aes256-ctr", 16, 32, 0, 0, 0, EVP_aes_256_ctr }, -# ifdef OPENSSL_HAVE_EVPGCM { "aes128-gcm@openssh.com", 16, 16, 12, 16, 0, EVP_aes_128_gcm }, { "aes256-gcm@openssh.com", 16, 32, 12, 16, 0, EVP_aes_256_gcm }, -# endif /* OPENSSL_HAVE_EVPGCM */ #else { "aes128-ctr", 16, 16, 0, 0, CFLAG_AESCTR, NULL }, { "aes192-ctr", 16, 24, 0, 0, CFLAG_AESCTR, NULL }, |