diff options
Diffstat (limited to 'src/daemon/https/tls/gnutls_handshake.c')
-rw-r--r-- | src/daemon/https/tls/gnutls_handshake.c | 47 |
1 files changed, 0 insertions, 47 deletions
diff --git a/src/daemon/https/tls/gnutls_handshake.c b/src/daemon/https/tls/gnutls_handshake.c index a0ea34c8..45041ccd 100644 --- a/src/daemon/https/tls/gnutls_handshake.c +++ b/src/daemon/https/tls/gnutls_handshake.c | |||
@@ -1929,36 +1929,6 @@ MHD__gnutls_send_server_hello (MHD_gtls_session_t session, int again) | |||
1929 | 1929 | ||
1930 | datalen = 0; | 1930 | datalen = 0; |
1931 | 1931 | ||
1932 | #ifdef ENABLE_SRP | ||
1933 | if (IS_SRP_KX | ||
1934 | (MHD_gtls_cipher_suite_get_kx_algo | ||
1935 | (&session->security_parameters.current_cipher_suite))) | ||
1936 | { | ||
1937 | /* While resuming we cannot check the username extension since it is | ||
1938 | * not available at this point. It will be copied on connection | ||
1939 | * state activation. | ||
1940 | */ | ||
1941 | if (session->internals.resumed == RESUME_FALSE && | ||
1942 | session->security_parameters.extensions.srp_username[0] == 0) | ||
1943 | { | ||
1944 | /* The peer didn't send a valid SRP extension with the | ||
1945 | * SRP username. The draft requires that we send a fatal | ||
1946 | * alert and abort. | ||
1947 | */ | ||
1948 | MHD_gnutls_assert (); | ||
1949 | ret = MHD__gnutls_alert_send (session, GNUTLS_AL_FATAL, | ||
1950 | GNUTLS_A_UNKNOWN_PSK_IDENTITY); | ||
1951 | if (ret < 0) | ||
1952 | { | ||
1953 | MHD_gnutls_assert (); | ||
1954 | return ret; | ||
1955 | } | ||
1956 | |||
1957 | return GNUTLS_E_ILLEGAL_SRP_USERNAME; | ||
1958 | } | ||
1959 | } | ||
1960 | #endif | ||
1961 | |||
1962 | if (again == 0) | 1932 | if (again == 0) |
1963 | { | 1933 | { |
1964 | datalen = 2 + session_id_len + 1 + TLS_RANDOM_SIZE + 3; | 1934 | datalen = 2 + session_id_len + 1 + TLS_RANDOM_SIZE + 3; |
@@ -2807,22 +2777,6 @@ check_server_params (MHD_gtls_session_t session, | |||
2807 | if (delete == 1) | 2777 | if (delete == 1) |
2808 | return 1; | 2778 | return 1; |
2809 | 2779 | ||
2810 | #ifdef ENABLE_PSK | ||
2811 | } | ||
2812 | else if (cred_type == MHD_GNUTLS_CRD_PSK) | ||
2813 | { | ||
2814 | MHD_gnutls_psk_server_credentials_t psk_cred = | ||
2815 | (MHD_gnutls_psk_server_credentials_t) MHD_gtls_get_cred (session->key, | ||
2816 | cred_type, | ||
2817 | NULL); | ||
2818 | |||
2819 | if (psk_cred != NULL) | ||
2820 | { | ||
2821 | dh_params = | ||
2822 | MHD_gtls_get_dh_params (psk_cred->dh_params, | ||
2823 | psk_cred->params_func, session); | ||
2824 | } | ||
2825 | #endif | ||
2826 | } | 2780 | } |
2827 | else | 2781 | else |
2828 | return 0; /* no need for params */ | 2782 | return 0; /* no need for params */ |
@@ -2955,7 +2909,6 @@ MHD_gtls_remove_unwanted_ciphersuites (MHD_gtls_session_t session, | |||
2955 | SRP credential too. */ | 2909 | SRP credential too. */ |
2956 | if (kx == MHD_GNUTLS_KX_SRP_RSA || kx == MHD_GNUTLS_KX_SRP_DSS) | 2910 | if (kx == MHD_GNUTLS_KX_SRP_RSA || kx == MHD_GNUTLS_KX_SRP_DSS) |
2957 | { | 2911 | { |
2958 | if (!MHD_gtls_get_cred (session->key, MHD_GNUTLS_CRD_SRP, NULL)) | ||
2959 | delete = 1; | 2912 | delete = 1; |
2960 | } | 2913 | } |
2961 | 2914 | ||