summaryrefslogtreecommitdiff
path: root/ssl/s3_both.c
diff options
context:
space:
mode:
authorNils Larsch <nils@openssl.org>2005-04-07 23:19:17 +0000
committerNils Larsch <nils@openssl.org>2005-04-07 23:19:17 +0000
commit6049399bafac74bd809ffac2108e8d5d284cd720 (patch)
tree14443a61bb1541f6f1ccb01b59b288ab3bd54cf3 /ssl/s3_both.c
parentf763e0b5ae74c67795d096c9029b5c61e891e68a (diff)
downloadopenssl-new-6049399bafac74bd809ffac2108e8d5d284cd720.tar.gz
get rid of very buggy and very imcomplete DH cert support
Reviewed by: Bodo Moeller
Diffstat (limited to 'ssl/s3_both.c')
-rw-r--r--ssl/s3_both.c26
1 files changed, 1 insertions, 25 deletions
diff --git a/ssl/s3_both.c b/ssl/s3_both.c
index 94df0e5c6c..b26fbe3637 100644
--- a/ssl/s3_both.c
+++ b/ssl/s3_both.c
@@ -497,7 +497,7 @@ err:
int ssl_cert_type(X509 *x, EVP_PKEY *pkey)
{
EVP_PKEY *pk;
- int ret= -1,i,j;
+ int ret= -1,i;
if (pkey == NULL)
pk=X509_get_pubkey(x);
@@ -509,41 +509,17 @@ int ssl_cert_type(X509 *x, EVP_PKEY *pkey)
if (i == EVP_PKEY_RSA)
{
ret=SSL_PKEY_RSA_ENC;
- if (x != NULL)
- {
- j=X509_get_ext_count(x);
- /* check to see if this is a signing only certificate */
- /* EAY EAY EAY EAY */
- }
}
else if (i == EVP_PKEY_DSA)
{
ret=SSL_PKEY_DSA_SIGN;
}
- else if (i == EVP_PKEY_DH)
- {
- /* if we just have a key, we needs to be guess */
-
- if (x == NULL)
- ret=SSL_PKEY_DH_DSA;
- else
- {
- j=X509_get_signature_type(x);
- if (j == EVP_PKEY_RSA)
- ret=SSL_PKEY_DH_RSA;
- else if (j== EVP_PKEY_DSA)
- ret=SSL_PKEY_DH_DSA;
- else ret= -1;
- }
- }
#ifndef OPENSSL_NO_EC
else if (i == EVP_PKEY_EC)
{
ret = SSL_PKEY_ECC;
}
#endif
- else
- ret= -1;
err:
if(!pkey) EVP_PKEY_free(pk);