gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-SVN] r7910 - in libmicrohttpd: . src/daemon/https/lgl src/daemon


From: gnunet
Subject: [GNUnet-SVN] r7910 - in libmicrohttpd: . src/daemon/https/lgl src/daemon/https/tls
Date: Sun, 16 Nov 2008 02:38:45 -0700 (MST)

Author: grothoff
Date: 2008-11-16 02:38:45 -0700 (Sun, 16 Nov 2008)
New Revision: 7910

Removed:
   libmicrohttpd/src/daemon/https/tls/ext_oprfi.c
   libmicrohttpd/src/daemon/https/tls/ext_oprfi.h
Modified:
   libmicrohttpd/configure.ac
   libmicrohttpd/src/daemon/https/lgl/gc-libgcrypt.c
   libmicrohttpd/src/daemon/https/tls/Makefile.am
   libmicrohttpd/src/daemon/https/tls/gnutls_algorithms.c
   libmicrohttpd/src/daemon/https/tls/gnutls_cipher_int.c
   libmicrohttpd/src/daemon/https/tls/gnutls_compress_int.c
   libmicrohttpd/src/daemon/https/tls/gnutls_extensions.c
   libmicrohttpd/src/daemon/https/tls/gnutls_handshake.c
Log:
more dce

Modified: libmicrohttpd/configure.ac
===================================================================
--- libmicrohttpd/configure.ac  2008-11-16 09:21:40 UTC (rev 7909)
+++ libmicrohttpd/configure.ac  2008-11-16 09:38:45 UTC (rev 7910)
@@ -292,51 +292,15 @@
 AM_CONDITIONAL(MHD_DEBUG_TLS, test "$enable_client_side" != "no")
 
 
-# optional: TLS support. Included by default
-AC_MSG_CHECKING(--enable-TLS argument)
-AC_ARG_ENABLE([TLS],
-   [AS_HELP_STRING([--enable-TLS],
-               [enable TLS support (default is yes)])],
-   [enable_TLS=$enableval],
-   [enable_TLS="yes"])
-AC_MSG_RESULT($enable_TLS)
-
-
-# optional: SSLv3 support. Exclude by default
-AC_MSG_CHECKING(--enable-SSL argument)
-AC_ARG_ENABLE([SSL],
-   [AS_HELP_STRING([--enable-SSL],
-               [enable SSLv3 support (default is no)])],
-   [enable_SSL=$enableval],
-   [enable_SSL="no"])
-AC_MSG_RESULT($enable_SSL)
-
-
-# optional: x509 certificate support. Include by default
-AC_MSG_CHECKING(--enable-x509 argument)
-AC_ARG_ENABLE([x509],
-   [AS_HELP_STRING([--enable-x509],
-               [enable x509 support (default is yes)])],
-   [enable_x509=$enableval],
-   [enable_x509="yes"])
-AC_MSG_RESULT($enable_x509)
-
 # test for libz (optional feature for HTTPS)
 zlib=1
 AC_CHECK_LIB(z, compress,,zlib=0)
 AM_CONDITIONAL(HAVE_LIBZ, test x$zlib = x1)
 
 # Symbols required by GNU_TLS 
-AC_DEFINE([ENABLE_MINITASN1],[1],[Include minitasn1 support])
-AC_DEFINE([GNULIB_GC_HMAC_SHA1],[1],[GNULIB_GC_HMAC_SHA1])
 AC_DEFINE([GNULIB_GC_RANDOM],[1],[GNULIB_GC_RANDOM])
-AC_DEFINE([ENABLE_PKI],[0],[Include PKI support])
-# gnutls debug support
-AC_DEFINE([DEBUG],[1],[Include gnutls debug message support])
-AC_DEFINE([C99_MACROS],[1],[Include gnutls debug message support])
 
 
-
 # gcov compilation
 use_gcov=no
 AC_ARG_ENABLE([coverage], AS_HELP_STRING([--enable-coverage],
@@ -403,9 +367,6 @@
 if test "$enable_HTTPS" = "yes"
 then
  AC_MSG_NOTICE([HTTPS subsystem configuration:
-  TLS support:       ${enable_TLS}
-  SSLv3 support:     ${enable_SSL}
-  x509 support:      ${enable_x509}
   Client code dep.:  ${MSG_CLIENT_SIDE}                
  ])
  if test "$zlib" != 1

Modified: libmicrohttpd/src/daemon/https/lgl/gc-libgcrypt.c
===================================================================
--- libmicrohttpd/src/daemon/https/lgl/gc-libgcrypt.c   2008-11-16 09:21:40 UTC 
(rev 7909)
+++ libmicrohttpd/src/daemon/https/lgl/gc-libgcrypt.c   2008-11-16 09:38:45 UTC 
(rev 7910)
@@ -121,16 +121,6 @@
       gcryalg = GCRY_CIPHER_RFC2268_40;
       break;
 
-#ifdef ENABLE_CAMELLIA
-    case GC_CAMELLIA128:
-      gcryalg = GCRY_CIPHER_CAMELLIA128;
-      break;
-
-    case GC_CAMELLIA256:
-      gcryalg = GCRY_CIPHER_CAMELLIA256;
-      break;
-#endif
-
     default:
       return GC_INVALID_CIPHER;
     }

Modified: libmicrohttpd/src/daemon/https/tls/Makefile.am
===================================================================
--- libmicrohttpd/src/daemon/https/tls/Makefile.am      2008-11-16 09:21:40 UTC 
(rev 7909)
+++ libmicrohttpd/src/daemon/https/tls/Makefile.am      2008-11-16 09:38:45 UTC 
(rev 7910)
@@ -25,7 +25,6 @@
 defines.h \
 ext_cert_type.c \
 ext_max_record.c \
-ext_oprfi.c \
 ext_server_name.c \
 gnutls_alert.c \
 gnutls_algorithms.c \

Deleted: libmicrohttpd/src/daemon/https/tls/ext_oprfi.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/ext_oprfi.c      2008-11-16 09:21:40 UTC 
(rev 7909)
+++ libmicrohttpd/src/daemon/https/tls/ext_oprfi.c      2008-11-16 09:38:45 UTC 
(rev 7910)
@@ -1,217 +0,0 @@
-/*
- * Copyright (C) 2007 Free Software Foundation
- *
- * Author: Simon Josefsson
- *
- * This file is part of GNUTLS.
- *
- * The GNUTLS library is free software; you can redistribute it and/or
- * modify it under the terms of the GNU Lesser General Public License
- * as published by the Free Software Foundation; either version 2.1 of
- * the License, or (at your option) any later version.
- *
- * This library is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
- * Lesser General Public License for more details.
- *
- * You should have received a copy of the GNU Lesser General Public
- * License along with this library; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301,
- * USA
- *
- */
-
-/* Implementation of Opaque PRF Input:
- * http://tools.ietf.org/id/draft-rescorla-tls-opaque-prf-input-00.txt
- *
- */
-
-#include "MHD_config.h"
-#include <ext_oprfi.h>
-
-#include <gnutls_errors.h>
-#include <gnutls_num.h>
-
-static int
-oprfi_recv_server (MHD_gtls_session_t session,
-                   const opaque * data, size_t _data_size)
-{
-  ssize_t data_size = _data_size;
-  uint16_t len;
-
-  if (!session->security_parameters.extensions.oprfi_cb)
-    {
-      MHD_gnutls_assert ();
-      return 0;
-    }
-
-  DECR_LEN (data_size, 2);
-  len = MHD_gtls_read_uint16 (data);
-  data += 2;
-
-  if (len != data_size)
-    {
-      MHD_gnutls_assert ();
-      return GNUTLS_E_UNEXPECTED_PACKET_LENGTH;
-    }
-
-  /* Store incoming data. */
-  session->security_parameters.extensions.oprfi_client_len = len;
-  session->security_parameters.extensions.oprfi_client =
-    MHD_gnutls_malloc (len);
-  if (!session->security_parameters.extensions.oprfi_client)
-    {
-      MHD_gnutls_assert ();
-      return GNUTLS_E_MEMORY_ERROR;
-    }
-  memcpy (session->security_parameters.extensions.oprfi_client, data, len);
-
-  return 0;
-}
-
-#if MHD_DEBUG_TLS
-static int
-oprfi_recv_client (MHD_gtls_session_t session,
-                   const opaque * data, size_t _data_size)
-{
-  ssize_t data_size = _data_size;
-  uint16_t len;
-
-  if (session->security_parameters.extensions.oprfi_client == NULL)
-    {
-      MHD_gnutls_assert ();
-      return 0;
-    }
-
-  DECR_LEN (data_size, 2);
-  len = MHD_gtls_read_uint16 (data);
-  data += 2;
-
-  if (len != data_size)
-    {
-      MHD_gnutls_assert ();
-      return GNUTLS_E_UNEXPECTED_PACKET_LENGTH;
-    }
-
-  if (len != session->security_parameters.extensions.oprfi_client_len)
-    {
-      MHD_gnutls_assert ();
-      return GNUTLS_E_RECEIVED_ILLEGAL_PARAMETER;
-    }
-
-  /* Store incoming data. */
-  session->security_parameters.extensions.oprfi_server_len = len;
-  session->security_parameters.extensions.oprfi_server =
-    MHD_gnutls_malloc (len);
-  if (!session->security_parameters.extensions.oprfi_server)
-    {
-      MHD_gnutls_assert ();
-      return GNUTLS_E_MEMORY_ERROR;
-    }
-  memcpy (session->security_parameters.extensions.oprfi_server, data, len);
-
-  return 0;
-}
-#endif
-
-int
-MHD_gtls_oprfi_recv_params (MHD_gtls_session_t session,
-                            const opaque * data, size_t data_size)
-{
-#if MHD_DEBUG_TLS
-  if (session->security_parameters.entity == GNUTLS_CLIENT)
-    return oprfi_recv_client (session, data, data_size);
-  else
-#endif
-    return oprfi_recv_server (session, data, data_size);
-}
-
-#if MHD_DEBUG_TLS
-static int
-oprfi_send_client (MHD_gtls_session_t session, opaque * data,
-                   size_t _data_size)
-{
-  opaque *p = data;
-  ssize_t data_size = _data_size;
-  int oprf_size = session->security_parameters.extensions.oprfi_client_len;
-
-  if (oprf_size == 0)
-    return 0;
-
-  DECR_LENGTH_RET (data_size, 2, GNUTLS_E_SHORT_MEMORY_BUFFER);
-  MHD_gtls_write_uint16 (oprf_size, p);
-  p += 2;
-
-  DECR_LENGTH_RET (data_size, oprf_size, GNUTLS_E_SHORT_MEMORY_BUFFER);
-
-  memcpy (p, session->security_parameters.extensions.oprfi_client, oprf_size);
-
-  return 2 + oprf_size;
-}
-#endif
-
-static int
-oprfi_send_server (MHD_gtls_session_t session, opaque * data,
-                   size_t _data_size)
-{
-  opaque *p = data;
-  int ret;
-  ssize_t data_size = _data_size;
-
-  if (!session->security_parameters.extensions.oprfi_client ||
-      !session->security_parameters.extensions.oprfi_cb)
-    return 0;
-
-  /* Allocate buffer for outgoing data. */
-  session->security_parameters.extensions.oprfi_server_len =
-    session->security_parameters.extensions.oprfi_client_len;
-  session->security_parameters.extensions.oprfi_server =
-    MHD_gnutls_malloc (session->security_parameters.extensions.
-                       oprfi_server_len);
-  if (!session->security_parameters.extensions.oprfi_server)
-    {
-      MHD_gnutls_assert ();
-      return GNUTLS_E_MEMORY_ERROR;
-    }
-
-  /* Get outgoing data. */
-  ret = session->security_parameters.extensions.oprfi_cb
-    (session, session->security_parameters.extensions.oprfi_userdata,
-     session->security_parameters.extensions.oprfi_client_len,
-     session->security_parameters.extensions.oprfi_client,
-     session->security_parameters.extensions.oprfi_server);
-  if (ret < 0)
-    {
-      MHD_gnutls_assert ();
-      MHD_gnutls_free (session->security_parameters.extensions.oprfi_server);
-      return ret;
-    }
-
-  DECR_LENGTH_RET (data_size, 2, GNUTLS_E_SHORT_MEMORY_BUFFER);
-  MHD_gtls_write_uint16 (session->security_parameters.extensions.
-                         oprfi_server_len, p);
-  p += 2;
-
-  DECR_LENGTH_RET (data_size,
-                   session->security_parameters.extensions.oprfi_server_len,
-                   GNUTLS_E_SHORT_MEMORY_BUFFER);
-
-  memcpy (p, session->security_parameters.extensions.oprfi_server,
-          session->security_parameters.extensions.oprfi_server_len);
-
-  return 2 + session->security_parameters.extensions.oprfi_server_len;
-}
-
-int
-MHD_gtls_oprfi_send_params (MHD_gtls_session_t session,
-                            opaque * data, size_t data_size)
-{
-#if MHD_DEBUG_TLS
-  if (session->security_parameters.entity == GNUTLS_CLIENT)
-    return oprfi_send_client (session, data, data_size);
-  else
-#endif
-    return oprfi_send_server (session, data, data_size);
-}
-

Deleted: libmicrohttpd/src/daemon/https/tls/ext_oprfi.h
===================================================================
--- libmicrohttpd/src/daemon/https/tls/ext_oprfi.h      2008-11-16 09:21:40 UTC 
(rev 7909)
+++ libmicrohttpd/src/daemon/https/tls/ext_oprfi.h      2008-11-16 09:38:45 UTC 
(rev 7910)
@@ -1,31 +0,0 @@
-/*
- * Copyright (C) 2007 Free Software Foundation
- *
- * Author: Simon Josefsson
- *
- * This file is part of GNUTLS.
- *
- * The GNUTLS library is free software; you can redistribute it and/or
- * modify it under the terms of the GNU Lesser General Public License
- * as published by the Free Software Foundation; either version 2.1 of
- * the License, or (at your option) any later version.
- *
- * This library is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
- * Lesser General Public License for more details.
- *
- * You should have received a copy of the GNU Lesser General Public
- * License along with this library; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301,
- * USA
- *
- */
-
-#include <gnutls_int.h>
-
-int MHD_gtls_oprfi_recv_params (MHD_gtls_session_t state,
-                                const opaque * data, size_t data_size);
-
-int MHD_gtls_oprfi_send_params (MHD_gtls_session_t state,
-                                opaque * data, size_t data_size);

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_algorithms.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_algorithms.c      2008-11-16 
09:21:40 UTC (rev 7909)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_algorithms.c      2008-11-16 
09:38:45 UTC (rev 7910)
@@ -235,14 +235,6 @@
    CIPHER_BLOCK,
    8,
    1},
-#ifdef ENABLE_CAMELLIA
-  {"CAMELLIA-256-CBC", MHD_GNUTLS_CIPHER_CAMELLIA_256_CBC, 16, 32,
-   CIPHER_BLOCK,
-   16, 0},
-  {"CAMELLIA-128-CBC", MHD_GNUTLS_CIPHER_CAMELLIA_128_CBC, 16, 16,
-   CIPHER_BLOCK,
-   16, 0},
-#endif
   {"NULL",
    MHD_GNUTLS_CIPHER_NULL,
    1,
@@ -268,10 +260,6 @@
   MHD_GNUTLS_CIPHER_ARCFOUR_128,
   MHD_GNUTLS_CIPHER_ARCFOUR_40,
   MHD_GNUTLS_CIPHER_RC2_40_CBC,
-#ifdef ENABLE_CAMELLIA
-  MHD_GNUTLS_CIPHER_CAMELLIA_256_CBC,
-  MHD_GNUTLS_CIPHER_CAMELLIA_128_CBC,
-#endif
   MHD_GNUTLS_CIPHER_NULL,
   0
 };
@@ -595,16 +583,6 @@
                              MHD_GNUTLS_CIPHER_AES_256_CBC,
                              MHD_GNUTLS_KX_DHE_DSS,
                              MHD_GNUTLS_MAC_SHA1, MHD_GNUTLS_PROTOCOL_SSL3),
-#ifdef ENABLE_CAMELLIA
-  GNUTLS_CIPHER_SUITE_ENTRY (GNUTLS_DHE_DSS_CAMELLIA_128_CBC_SHA1,
-                             MHD_GNUTLS_CIPHER_CAMELLIA_128_CBC,
-                             MHD_GNUTLS_KX_DHE_DSS,
-                             MHD_GNUTLS_MAC_SHA1, MHD_GNUTLS_PROTOCOL_TLS1_0),
-  GNUTLS_CIPHER_SUITE_ENTRY (GNUTLS_DHE_DSS_CAMELLIA_256_CBC_SHA1,
-                             MHD_GNUTLS_CIPHER_CAMELLIA_256_CBC,
-                             MHD_GNUTLS_KX_DHE_DSS,
-                             MHD_GNUTLS_MAC_SHA1, MHD_GNUTLS_PROTOCOL_TLS1_0),
-#endif
   /* DHE_RSA */
   GNUTLS_CIPHER_SUITE_ENTRY (GNUTLS_DHE_RSA_3DES_EDE_CBC_SHA1,
                              MHD_GNUTLS_CIPHER_3DES_CBC,
@@ -618,16 +596,6 @@
                              MHD_GNUTLS_CIPHER_AES_256_CBC,
                              MHD_GNUTLS_KX_DHE_RSA,
                              MHD_GNUTLS_MAC_SHA1, MHD_GNUTLS_PROTOCOL_SSL3),
-#ifdef ENABLE_CAMELLIA
-  GNUTLS_CIPHER_SUITE_ENTRY (GNUTLS_DHE_RSA_CAMELLIA_128_CBC_SHA1,
-                             MHD_GNUTLS_CIPHER_CAMELLIA_128_CBC,
-                             MHD_GNUTLS_KX_DHE_RSA,
-                             MHD_GNUTLS_MAC_SHA1, MHD_GNUTLS_PROTOCOL_TLS1_0),
-  GNUTLS_CIPHER_SUITE_ENTRY (GNUTLS_DHE_RSA_CAMELLIA_256_CBC_SHA1,
-                             MHD_GNUTLS_CIPHER_CAMELLIA_256_CBC,
-                             MHD_GNUTLS_KX_DHE_RSA,
-                             MHD_GNUTLS_MAC_SHA1, MHD_GNUTLS_PROTOCOL_TLS1_0),
-#endif
   /* RSA */
   GNUTLS_CIPHER_SUITE_ENTRY (GNUTLS_RSA_NULL_MD5,
                              MHD_GNUTLS_CIPHER_NULL,
@@ -657,16 +625,6 @@
   GNUTLS_CIPHER_SUITE_ENTRY (GNUTLS_RSA_AES_256_CBC_SHA1,
                              MHD_GNUTLS_CIPHER_AES_256_CBC, MHD_GNUTLS_KX_RSA,
                              MHD_GNUTLS_MAC_SHA1, MHD_GNUTLS_PROTOCOL_SSL3),
-#ifdef ENABLE_CAMELLIA
-  GNUTLS_CIPHER_SUITE_ENTRY (GNUTLS_RSA_CAMELLIA_128_CBC_SHA1,
-                             MHD_GNUTLS_CIPHER_CAMELLIA_128_CBC,
-                             MHD_GNUTLS_KX_RSA,
-                             MHD_GNUTLS_MAC_SHA1, MHD_GNUTLS_PROTOCOL_TLS1_0),
-  GNUTLS_CIPHER_SUITE_ENTRY (GNUTLS_RSA_CAMELLIA_256_CBC_SHA1,
-                             MHD_GNUTLS_CIPHER_CAMELLIA_256_CBC,
-                             MHD_GNUTLS_KX_RSA,
-                             MHD_GNUTLS_MAC_SHA1, MHD_GNUTLS_PROTOCOL_TLS1_0),
-#endif
   {0,
    {
     {0,
@@ -1245,39 +1203,11 @@
     }
 }
 
-#ifdef SORT_DEBUG
-static void
-MHD__gnutls_bsort (MHD_gtls_session_t session, void *_base, size_t nmemb,
-                   size_t size, int (*compar) (MHD_gtls_session_t,
-                                               const void *, const void *))
-{
-  unsigned int i, j;
-  int full = nmemb * size;
-  char *base = _base;
-  char tmp[MAX_ELEM_SIZE];
-
-  for (i = 0; i < full; i += size)
-    {
-      for (j = 0; j < full; j += size)
-        {
-          if (compar (session, &base[i], &base[j]) < 0)
-            {
-              SWAP (&base[j], &base[i]);
-            }
-        }
-    }
-
-}
-#endif
-
 int
 MHD_gtls_supported_ciphersuites_sorted (MHD_gtls_session_t session,
                                         cipher_suite_st ** ciphers)
 {
 
-#ifdef SORT_DEBUG
-  unsigned int i;
-#endif
   int count;
 
   count = MHD_gtls_supported_ciphersuites (session, ciphers);
@@ -1286,23 +1216,9 @@
       MHD_gnutls_assert ();
       return count;
     }
-#ifdef SORT_DEBUG
-  MHD__gnutls_debug_log ("Unsorted: \n");
-  for (i = 0; i < count; i++)
-    MHD__gnutls_debug_log ("\t%d: %s\n", i,
-                           MHD_gtls_cipher_suite_get_name ((*ciphers)[i]));
-#endif
-
   MHD__gnutls_qsort (session, *ciphers, count, sizeof (cipher_suite_st),
                      MHD__gnutls_compare_algo);
 
-#ifdef SORT_DEBUG
-  MHD__gnutls_debug_log ("Sorted: \n");
-  for (i = 0; i < count; i++)
-    MHD__gnutls_debug_log ("\t%d: %s\n", i,
-                           MHD_gtls_cipher_suite_get_name ((*ciphers)[i]));
-#endif
-
   return count;
 }
 

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_cipher_int.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_cipher_int.c      2008-11-16 
09:21:40 UTC (rev 7909)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_cipher_int.c      2008-11-16 
09:38:45 UTC (rev 7910)
@@ -65,16 +65,6 @@
       err = MHD_gc_cipher_open (GC_ARCTWO40, GC_CBC, &ret);
       break;
 
-#ifdef ENABLE_CAMELLIA
-    case MHD_GNUTLS_CIPHER_CAMELLIA_128_CBC:
-      err = MHD_gc_cipher_open (GC_CAMELLIA128, GC_CBC, &ret);
-      break;
-
-    case MHD_GNUTLS_CIPHER_CAMELLIA_256_CBC:
-      err = MHD_gc_cipher_open (GC_CAMELLIA256, GC_CBC, &ret);
-      break;
-#endif
-
     default:
       return NULL;
     }

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_compress_int.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_compress_int.c    2008-11-16 
09:21:40 UTC (rev 7909)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_compress_int.c    2008-11-16 
09:38:45 UTC (rev 7910)
@@ -190,12 +190,6 @@
       return GNUTLS_E_INTERNAL_ERROR;
     }                           /* switch */
 
-#ifdef COMPRESSION_DEBUG
-  MHD__gnutls_debug_log ("Compression ratio: %f\n",
-                         (float) ((float) compressed_size /
-                                  (float) plain_size));
-#endif
-
   if ((size_t) compressed_size > max_comp_size)
     {
       MHD_gnutls_free (*compressed);

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_extensions.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_extensions.c      2008-11-16 
09:21:40 UTC (rev 7909)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_extensions.c      2008-11-16 
09:38:45 UTC (rev 7910)
@@ -58,12 +58,6 @@
                           EXTENSION_APPLICATION,
                           MHD_gtls_server_name_recv_params,
                           MHD_gtls_server_name_send_params),
-#ifdef ENABLE_OPRFI
-  GNUTLS_EXTENSION_ENTRY (GNUTLS_EXTENSION_OPAQUE_PRF_INPUT,
-                          EXTENSION_TLS,
-                          MHD_gtls_oprfi_recv_params,
-                          MHD_gtls_oprfi_send_params),
-#endif
   {0, 0, 0, 0}
 };
 

Modified: libmicrohttpd/src/daemon/https/tls/gnutls_handshake.c
===================================================================
--- libmicrohttpd/src/daemon/https/tls/gnutls_handshake.c       2008-11-16 
09:21:40 UTC (rev 7909)
+++ libmicrohttpd/src/daemon/https/tls/gnutls_handshake.c       2008-11-16 
09:38:45 UTC (rev 7910)
@@ -763,20 +763,6 @@
       MHD_gnutls_assert ();
       return GNUTLS_E_UNEXPECTED_PACKET_LENGTH;
     }
-#ifdef HANDSHAKE_DEBUG
-
-  MHD__gnutls_handshake_log ("HSK[%x]: Requested cipher suites: \n", session);
-  for (j = 0; j < datalen; j += 2)
-    {
-      memcpy (&cs.suite, &data[j], 2);
-      MHD__gnutls_handshake_log ("\t%s\n",
-                                 MHD_gtls_cipher_suite_get_name (&cs));
-    }
-  MHD__gnutls_handshake_log ("HSK[%x]: Supported cipher suites: \n", session);
-  for (j = 0; j < x; j++)
-    MHD__gnutls_handshake_log ("\t%s\n",
-                               MHD_gtls_cipher_suite_get_name (&ciphers[j]));
-#endif
   memset (session->security_parameters.current_cipher_suite.suite, '\0', 2);
 
   retval = GNUTLS_E_UNKNOWN_CIPHER_SUITE;
@@ -2315,18 +2301,6 @@
 {
   int ret = 0;
 
-#ifdef HANDSHAKE_DEBUG
-  char buf[64];
-
-  if (session->internals.resumed_security_parameters.session_id_size > 0)
-    MHD__gnutls_handshake_log ("HSK[%x]: Ask to resume: %s\n", session,
-                               MHD_gtls_bin2hex (session->
-                                                 
internals.resumed_security_parameters.session_id,
-                                                 session->
-                                                 
internals.resumed_security_parameters.session_id_size,
-                                                 buf, sizeof (buf)));
-#endif
-
   switch (STATE)
     {
     case STATE0:





reply via email to

[Prev in Thread] Current Thread [Next in Thread]