aboutsummaryrefslogtreecommitdiff
path: root/src/daemon/https/tls/gnutls_handshake.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/daemon/https/tls/gnutls_handshake.c')
-rw-r--r--src/daemon/https/tls/gnutls_handshake.c47
1 files changed, 0 insertions, 47 deletions
diff --git a/src/daemon/https/tls/gnutls_handshake.c b/src/daemon/https/tls/gnutls_handshake.c
index a0ea34c8..45041ccd 100644
--- a/src/daemon/https/tls/gnutls_handshake.c
+++ b/src/daemon/https/tls/gnutls_handshake.c
@@ -1929,36 +1929,6 @@ MHD__gnutls_send_server_hello (MHD_gtls_session_t session, int again)
1929 1929
1930 datalen = 0; 1930 datalen = 0;
1931 1931
1932#ifdef ENABLE_SRP
1933 if (IS_SRP_KX
1934 (MHD_gtls_cipher_suite_get_kx_algo
1935 (&session->security_parameters.current_cipher_suite)))
1936 {
1937 /* While resuming we cannot check the username extension since it is
1938 * not available at this point. It will be copied on connection
1939 * state activation.
1940 */
1941 if (session->internals.resumed == RESUME_FALSE &&
1942 session->security_parameters.extensions.srp_username[0] == 0)
1943 {
1944 /* The peer didn't send a valid SRP extension with the
1945 * SRP username. The draft requires that we send a fatal
1946 * alert and abort.
1947 */
1948 MHD_gnutls_assert ();
1949 ret = MHD__gnutls_alert_send (session, GNUTLS_AL_FATAL,
1950 GNUTLS_A_UNKNOWN_PSK_IDENTITY);
1951 if (ret < 0)
1952 {
1953 MHD_gnutls_assert ();
1954 return ret;
1955 }
1956
1957 return GNUTLS_E_ILLEGAL_SRP_USERNAME;
1958 }
1959 }
1960#endif
1961
1962 if (again == 0) 1932 if (again == 0)
1963 { 1933 {
1964 datalen = 2 + session_id_len + 1 + TLS_RANDOM_SIZE + 3; 1934 datalen = 2 + session_id_len + 1 + TLS_RANDOM_SIZE + 3;
@@ -2807,22 +2777,6 @@ check_server_params (MHD_gtls_session_t session,
2807 if (delete == 1) 2777 if (delete == 1)
2808 return 1; 2778 return 1;
2809 2779
2810#ifdef ENABLE_PSK
2811 }
2812 else if (cred_type == MHD_GNUTLS_CRD_PSK)
2813 {
2814 MHD_gnutls_psk_server_credentials_t psk_cred =
2815 (MHD_gnutls_psk_server_credentials_t) MHD_gtls_get_cred (session->key,
2816 cred_type,
2817 NULL);
2818
2819 if (psk_cred != NULL)
2820 {
2821 dh_params =
2822 MHD_gtls_get_dh_params (psk_cred->dh_params,
2823 psk_cred->params_func, session);
2824 }
2825#endif
2826 } 2780 }
2827 else 2781 else
2828 return 0; /* no need for params */ 2782 return 0; /* no need for params */
@@ -2955,7 +2909,6 @@ MHD_gtls_remove_unwanted_ciphersuites (MHD_gtls_session_t session,
2955 SRP credential too. */ 2909 SRP credential too. */
2956 if (kx == MHD_GNUTLS_KX_SRP_RSA || kx == MHD_GNUTLS_KX_SRP_DSS) 2910 if (kx == MHD_GNUTLS_KX_SRP_RSA || kx == MHD_GNUTLS_KX_SRP_DSS)
2957 { 2911 {
2958 if (!MHD_gtls_get_cred (session->key, MHD_GNUTLS_CRD_SRP, NULL))
2959 delete = 1; 2912 delete = 1;
2960 } 2913 }
2961 2914